forked from bytecodealliance/wasmtime
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Refer to BA security policy (bytecodealliance#2912)
- Loading branch information
1 parent
3308649
commit 3b3b126
Showing
5 changed files
with
8 additions
and
29 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,29 +1,3 @@ | ||
# Security Policy | ||
|
||
Building secure foundations for software development is at the core of what we do in the Bytecode Alliance. Contributions of external security researchers are a vital part of that. | ||
|
||
## Scope | ||
|
||
If you believe you've found a security issue in any website, service, or software owned or operated by the Bytecode Alliance, we encourage you to notify us. | ||
|
||
## How to Submit a Report | ||
|
||
To submit a vulnerability report to the Bytecode Alliance, please contact us at [[email protected]](mailto:[email protected]). Your submission will be reviewed and validated by a member of our security team. | ||
|
||
## Safe Harbor | ||
|
||
The Bytecode Alliance supports safe harbor for security researchers who: | ||
|
||
* Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our services. | ||
* Only interact with accounts you own or with explicit permission of the account holder. If you do encounter Personally Identifiable Information (PII) contact us immediately, do not proceed with access, and immediately purge any local information. | ||
* Provide us with a reasonable amount of time to resolve vulnerabilities prior to any disclosure to the public or a third-party. | ||
|
||
We will consider activities conducted consistent with this policy to constitute "authorized" conduct and will not pursue civil action or initiate a complaint to law enforcement. We will help to the extent we can if legal action is initiated by a third party against you. | ||
|
||
Please submit a report to us before engaging in conduct that may be inconsistent with or unaddressed by this policy. | ||
|
||
## Preferences | ||
|
||
* Please provide detailed reports with reproducible steps and a clearly defined impact. | ||
* Submit one vulnerability per report. | ||
* Social engineering (e.g. phishing, vishing, smishing) is prohibited. | ||
Please refer to the [Bytecode Alliance security policy](https://bytecodealliance.org/security) for details on how to report security issues in Wasmtime, our disclosure policy, and how to receive notifications about security issues. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
# Security Policy | ||
|
||
Please refer to the [Bytecode Alliance security policy](https://bytecodealliance.org/security) for details on how to report security issues in Cranelift, our disclosure policy, and how to receive notifications about security issues. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,3 @@ | ||
# Disclosure Policy | ||
|
||
... more coming soon | ||
The disclosure policy for security issues in Wasmtime is [documented on the Bytecode Alliance website](https://bytecodealliance.org/security#disclosure-policy). |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,3 @@ | ||
# Security | ||
|
||
... more coming soon | ||
Please refer to the [Bytecode Alliance security policy](https://bytecodealliance.org/security) for details on how to report security issues in Wasmtime, our disclosure policy, and how to receive notifications about security issues. |