Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Define an org-wide security policy #12

Closed
travi opened this issue Jun 17, 2022 · 2 comments
Closed

Define an org-wide security policy #12

travi opened this issue Jun 17, 2022 · 2 comments

Comments

@travi
Copy link
Member

travi commented Jun 17, 2022

We should get a policy defined for the org and can define it in one place in this repo. We've needed one for a while anyway, but semantic-release/semantic-release#2449 revealing a vulnerability publicly rather than doing coordinated disclosure by starting the conversation privately highlights further that outlining a policy could be a helpful reminder for users that are looking to contact us.

The complication involved in defining a policy is that there is no way built into GitHub for initiating the private conversation, leaving email as the best option for initial contact. In order to avoid revealing the personal email addresses of our maintainers in a public file, it would be better if we could set up a security address that could be routed to maintainers through the semantic-release.org domain.

If we're ok with moving the domain to Cloudflare, I recommend that we use their email routing service:

@travi
Copy link
Member Author

travi commented Jun 17, 2022

I've created a Cloudflare org/account and can invite maintainers to that org, but would need info about an existing personal Cloudflare account to do so.

The domain transfer is quick and painless. I've moved several to Cloudflare and have been happy with managing domains there.

@travi
Copy link
Member Author

travi commented Aug 29, 2023

this is covered by https://github.com/semantic-release/.github/blob/main/.github/SECURITY.md at this point

@travi travi closed this as completed Aug 29, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant