Skip to content

Commit f0fd9e1

Browse files
committed
docs: publish a security policy
1 parent 6a91a05 commit f0fd9e1

File tree

4 files changed

+48
-0
lines changed

4 files changed

+48
-0
lines changed

.github/issue_template.md

+4
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
1+
If you are reporting a security vulnerability, please do not submit an issue.
2+
Instead, follow the guidelines described in our
3+
[security policy](../blob/main/SECURITY.md).
4+
15
If you are submitting a bug report because you are receiving an error or because
26
this project is incompatible with the [official JSON5 specification][spec],
37
please continue.

.github/pull_request_template.md

+4
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
1+
If you are patching a security vulnerability, please do not submit a pull
2+
request. Instead, follow the guidelines described in our
3+
[security policy](../blob/main/SECURITY.md).
4+
15
If you are submitting a bug fix for an an error or fixing an incompatibility
26
with the [official JSON5 specification][spec], please continue.
37

README.md

+4
Original file line numberDiff line numberDiff line change
@@ -244,6 +244,10 @@ that compatibility is a fundamental premise of JSON5.
244244
To report bugs or request features regarding this **JavaScript implementation**
245245
of JSON5, please submit an issue to **_this_ repository**.
246246

247+
### Security Vulnerabilities and Disclosures
248+
To report a security vulnerability, please follow the follow the guidelines
249+
described in our [security policy](./SECURITY.md).
250+
247251
## License
248252
MIT. See [LICENSE.md](./LICENSE.md) for details.
249253

SECURITY.md

+36
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
# JSON5 Security Policy
2+
3+
We take security seriously. Responsible reporting and disclosure of security
4+
vulnerabilities is important for the protection and privacy of our users. If you
5+
discover any security vulnerabilities, please follow these guidelines.
6+
7+
To report a vulnerability, we recommend submitting a report to Snyk using their
8+
[vulnerability disclosure form](https://snyk.io/vulnerability-disclosure/).
9+
Snyk's security team will validate the vulnerability and coordinate with you and
10+
us to fix it, release a patch, and responsibly disclose the vulnerability. Read
11+
Snyk's
12+
[Vulnerability Disclosure Policy](https://docs.snyk.io/more-info/disclosing-vulnerabilities/disclose-a-vulnerability-in-an-open-source-package)
13+
for details.
14+
15+
We also request that you send an email to
16+
[[email protected]](mailto:[email protected]) detailing the vulnerability.
17+
This ensures that we can begin work on a fix as soon as possible without waiting
18+
for Snyk to contact us.
19+
20+
Please do not report undisclosed vulnerabilities on public sites or forums,
21+
including GitHub issues and pull requests. Reporting vulnerabilities to the
22+
public could allow attackers to exploit vulnerable applications before we have
23+
been able to release a patch and before applications have had time to install
24+
the patch. Once we have released a patch and sufficient time has passed for
25+
applications to install the patch, we will disclose the vulnerability to the
26+
public, at which time you will be free to publish details of the vulnerability
27+
on public sites and forums.
28+
29+
If you have a fix for a security vulnerability, please do not submit a GitHub
30+
pull request. Instead, report the vulnerability as described in this policy and
31+
include a potential fix in the report. Once the vulnerability has been verified
32+
and a disclosure timeline has been decided, we will contact you to see if you
33+
would like to submit a pull request.
34+
35+
We appreciate your cooperation in helping keep our users safe by following this
36+
policy.

0 commit comments

Comments
 (0)