Add a SECURITY.md
This file shall describe the vulnerability disclosure process for kas and the security context in which kas should be seen. Reporting vulnerabilities via github has already been activated. Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
This commit is contained in:
parent
66893480c7
commit
039a320631
31
SECURITY.md
Normal file
31
SECURITY.md
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
The kas community takes the security of its code seriously. If you think you
|
||||||
|
have found a security vulnerability, please read the next sections and follow
|
||||||
|
the instructions to report your finding.
|
||||||
|
|
||||||
|
## Security Context
|
||||||
|
|
||||||
|
Open source software can be used in various contexts that may go far beyond
|
||||||
|
what it was originally designed and also secured for. Therefore, we describe
|
||||||
|
here how kas is currently expected to be used in security-sensitive scenarios.
|
||||||
|
|
||||||
|
In a nutshell, the purpose of kas is fetching known and previously validated
|
||||||
|
content, identifying it as original, and then configuring and building
|
||||||
|
artifacts. Therefore, anything that may prevent checking the integrity of
|
||||||
|
fetched content prior to executing instructions it carries is security-wise in
|
||||||
|
scope for kas. This affects both the kas tool itself and the containers
|
||||||
|
provided by kas because they also contain tools that kas or bitbake use for
|
||||||
|
fetching and validating.
|
||||||
|
|
||||||
|
## Reporting a Vulnerability
|
||||||
|
|
||||||
|
Please DO NOT report any potential security vulnerability via a public channel
|
||||||
|
(mailing list, github issue etc.). Instead, create a report via
|
||||||
|
https://github.com/siemens/kas/security/advisories/new or contact the
|
||||||
|
maintainer jan.kiszka@siemens.com via email directly. Please provide a detailed
|
||||||
|
description of the issue, the steps to reproduce it, the affected versions and,
|
||||||
|
if already available, a proposal for a fix. You should receive a response
|
||||||
|
within 5 working days. If the issue is confirmed as a vulnerability by us, we
|
||||||
|
will open a Security Advisory on github and give credits for your report if
|
||||||
|
desired. This project follows a 90 day disclosure timeline.
|
Loading…
Reference in New Issue
Block a user