Skip to content

Updating the security policy#5781

Merged
simon-song-wd merged 3 commits intomainfrom
security_policy
Feb 19, 2026
Merged

Updating the security policy#5781
simon-song-wd merged 3 commits intomainfrom
security_policy

Conversation

@simon-song-wd
Copy link
Copy Markdown
Contributor

No description provided.

@gemini-code-assist
Copy link
Copy Markdown
Contributor

Summary of Changes

Hello @simon-song-wd, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request comprehensively updates the project's security policy, providing a more robust and transparent framework for vulnerability reporting and management. The changes aim to clarify expectations for security researchers, streamline the reporting process, and establish clear timelines for validation, remediation, and public disclosure, ultimately enhancing the overall security posture.

Highlights

  • Enhanced Security Policy Structure: The SECURITY.md file has been significantly restructured and expanded to provide clearer guidelines for vulnerability reporting and management.
  • Detailed Reporting and Disclosure: New sections define specific requirements for vulnerability reporting, including exploitability proof and CVSS scores, along with updated disclosure terms and extended advance notice periods for research presentations.
  • Transparent Timelines: Clear timelines for report validation, vulnerability remediation, and public disclosure have been introduced, improving transparency for security researchers.
  • Expanded Out-of-Scope List: The list of vulnerabilities considered out of scope has been substantially updated and expanded for better clarity and specificity.
Changelog
  • SECURITY.md
    • Added a 'Scope' section defining the covered assets.
    • Expanded the list of 'Out of scope vulnerabilities' with more specific exclusions.
    • Revised 'Reporting Guidelines' to require proof of concept, CVSS vector, and confirmation of exploitability.
    • Renamed 'Disclosure Guidelines' to 'Disclosure Terms' and updated the advance notice period for research presentations.
    • Introduced new sections for 'Report Validation Times' and 'Remediation' with estimated timelines based on severity.
    • Established a 'Public Disclosure Timeline' policy, occurring 30 days after a security patch release.
    • Added a dedicated section for 'Reaching out to the Security team' with contact information.
Activity
  • No human activity has been recorded on this pull request yet.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request provides a significant update to the security policy, adding more detail and structure. The changes are mostly positive, but there are a few areas with redundant information and minor typos that should be addressed to improve clarity and professionalism. I've left specific comments on these points.

- CSRF on unauthenticated/logout/login pages
- Hypothetical issues that do not have a demonstrable, practical impact
- Vulnerabilities that affect out-of-date browsers
- ClickjackingCSRF on unauthenticated/logout/login pages
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

There's a typo in this line. 'Clickjacking' and 'CSRF' have been merged into one word. They should be separated for clarity.

Suggested change
- ClickjackingCSRF on unauthenticated/logout/login pages
- Clickjacking and CSRF on unauthenticated/logout/login pages

Comment on lines 17 to +28
- Social engineering attacks
- Activities that cause service disruption (DoS)
- Denial service via bruteforce attack
- Content spoofing and text injection without a valid attack vector
- Username enumeration via Login Page error message
- Username enumeration via Forgot password error message
- Bruteforce attacks
- Email spoofing
- Absence of DNSSEC, CAA, CSP headers
- Missing Secure or HTTP-only flag on non-sensitive cookies
- Deadlinks
- User enumeration
- Social Engineering
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The 'Out of scope vulnerabilities' list contains some redundant entries that should be consolidated for clarity:

  • 'Social engineering attacks' (line 17) is repeated as 'Social Engineering' (line 28).
  • 'Denial service via bruteforce attack' (line 18) and 'Bruteforce attacks' (line 22) are overlapping.

Please review and merge these items to make the list clearer and more concise.

Comment on lines 35 to +45
### Reporting Guidelines

- Submit your findings to https://github.com/FlowiseAI/Flowise/security
- Provide clear details to help us reproduce and fix the issue quickly.

### Disclosure Guidelines
### Reporting Guidelines

- Submit your findings to https://github.com/FlowiseAI/Flowise/security
- Ensure that the vulnerability is exploitable. Theoretical or static application security testing reports are subject to dismissal.
- Submit the report with CVSS vector and calculated severity.
- Provide a clear detailed report with proof of concept to help us reproduce and remediate the vulnerability.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

There are two Reporting Guidelines sections, which is redundant. The second section is more comprehensive. Please remove the first, duplicated section to avoid confusion.

Suggested change
### Reporting Guidelines
- Submit your findings to https://github.com/FlowiseAI/Flowise/security
- Provide clear details to help us reproduce and fix the issue quickly.
### Disclosure Guidelines
### Reporting Guidelines
- Submit your findings to https://github.com/FlowiseAI/Flowise/security
- Ensure that the vulnerability is exploitable. Theoretical or static application security testing reports are subject to dismissal.
- Submit the report with CVSS vector and calculated severity.
- Provide a clear detailed report with proof of concept to help us reproduce and remediate the vulnerability.
### Reporting Guidelines
- Submit your findings to https://github.com/FlowiseAI/Flowise/security
- Ensure that the vulnerability is exploitable. Theoretical or static application security testing reports are subject to dismissal.
- Submit the report with CVSS vector and calculated severity.
- Provide a clear detailed report with proof of concept to help us reproduce and remediate the vulnerability.

Public Disclosure occurs exactly 30 days after the next official release that includes the security patch. This period gives Flowise users a time to adopt the patched version before technical vulnerability details are made public, mitigating the risk of immediate post-disclosure exploitation.

#### Reaching out to the Security team
To report a new vulnerability, please submit a Github security Security Advisory report.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The word 'Security' is repeated in 'Github security Security Advisory report'. Removing the duplicate will improve readability.

Suggested change
To report a new vulnerability, please submit a Github security Security Advisory report.
To report a new vulnerability, please submit a Github Security Advisory report.

@harshit-flowise harshit-flowise self-requested a review February 18, 2026 23:49
Copy link
Copy Markdown

@harshit-flowise harshit-flowise left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks Good

@simon-song-wd simon-song-wd merged commit 88de0a5 into main Feb 19, 2026
7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants