-
Notifications
You must be signed in to change notification settings - Fork 9
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Andrew Lilley Brinker <[email protected]>
- Loading branch information
1 parent
f217aeb
commit d5bd047
Showing
1 changed file
with
45 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
# Security Policy | ||
|
||
The following versions of this repository's crates are considered supported, | ||
and will receive security updates. | ||
|
||
__`gitoid`__ | ||
|
||
| Version | Supported | | ||
|:-----------------| ------------------ | | ||
| `gitoid-0.4.x` | :white_check_mark: | | ||
| `gitoid-0.3.x` | :x: | | ||
|
||
__`omnibor`__ | ||
|
||
| Version | Supported | | ||
|:-----------------| ------------------ | | ||
| `omnibor-0.2.x` | :white_check_mark: | | ||
|
||
## Reporting a Vulnerability | ||
|
||
Vulnerabilities can be reported using the "Report a Vulnerability" button under | ||
the security tab of the repository. If a vulnerability is found to be legitimate, | ||
a RustSec advisory will be created. | ||
|
||
Please give us 90 days to respond to a vulnerability disclosure. In general, we | ||
will try to be faster than that to produce fixes and respond publicly to | ||
disclosures. | ||
|
||
If we accept the legitimacy of a vulnerability, please wait for us to have | ||
publcily responded to the vulnerability, including publication of new versions, | ||
yanking of old versions, and public disclosure in the RustSec database, before | ||
publicly disclosing the vulnerability yourself. | ||
|
||
We ask that you _not_ create advisories yourself, but instead submit | ||
vulnerability reports to us first so we can plan a response including | ||
producing any necessary patches, publishing fixed versions, yanking affected | ||
versions, and communicating about the vulnerability to users. | ||
|
||
We consider soundness violations (violations of safe Rust's memory, thread, or | ||
type safety guarantees) to be at least informational vulnerabilities and | ||
will treat them as such. | ||
|
||
RustSec advisories are automatically imported into the GitHub Security Advisory | ||
system, and into the OSV database, so duplicate reports do not need to be made | ||
for those systems. |