|
| 1 | +# JSON5 Security Policy |
| 2 | + |
| 3 | +We take security seriously. Responsible reporting and disclosure of security |
| 4 | +vulnerabilities is important for the protection and privacy of our users. If you |
| 5 | +discover any security vulnerabilities, please follow these guidelines. |
| 6 | + |
| 7 | +To report a vulnerability, we recommend submitting a report to Snyk using their |
| 8 | +[vulnerability disclosure form](https://snyk.io/vulnerability-disclosure/). |
| 9 | +Snyk's security team will validate the vulnerability and coordinate with you and |
| 10 | +us to fix it, release a patch, and responsibly disclose the vulnerability. Read |
| 11 | +Snyk's |
| 12 | +[Vulnerability Disclosure Policy](https://docs.snyk.io/more-info/disclosing-vulnerabilities/disclose-a-vulnerability-in-an-open-source-package) |
| 13 | +for details. |
| 14 | + |
| 15 | +We also request that you send an email to |
| 16 | +[[email protected]](mailto:[email protected]) detailing the vulnerability. |
| 17 | +This ensures that we can begin work on a fix as soon as possible without waiting |
| 18 | +for Snyk to contact us. |
| 19 | + |
| 20 | +Please do not report undisclosed vulnerabilities on public sites or forums, |
| 21 | +including GitHub issues and pull requests. Reporting vulnerabilities to the |
| 22 | +public could allow attackers to exploit vulnerable applications before we have |
| 23 | +been able to release a patch and before applications have had time to install |
| 24 | +the patch. Once we have released a patch and sufficient time has passed for |
| 25 | +applications to install the patch, we will disclose the vulnerability to the |
| 26 | +public, at which time you will be free to publish details of the vulnerability |
| 27 | +on public sites and forums. |
| 28 | + |
| 29 | +If you have a fix for a security vulnerability, please do not submit a GitHub |
| 30 | +pull request. Instead, report the vulnerability as described in this policy and |
| 31 | +include a potential fix in the report. Once the vulnerability has been verified |
| 32 | +and a disclosure timeline has been decided, we will contact you to see if you |
| 33 | +would like to submit a pull request. |
| 34 | + |
| 35 | +We appreciate your cooperation in helping keep our users safe by following this |
| 36 | +policy. |
0 commit comments