-
Notifications
You must be signed in to change notification settings - Fork 5
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
33 additions
and
0 deletions.
There are no files selected for viewing
Validating CODEOWNERS rules …
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
# @kaje94 owns the entire repository | ||
* @kaje94 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
|
||
Certainly! Here's a basic template for a SECURITY.md file: | ||
|
||
markdown | ||
Copy code | ||
# Security Policy | ||
|
||
## Reporting a Vulnerability | ||
|
||
If you believe you have found a security vulnerability, please report it to us as soon as possible. We take all security reports seriously and will work with you to verify the issue, address it, and publicly disclose the findings if necessary. | ||
|
||
To report a security issue, email us directly at [a.kajendran@gmail.com](mailto:a.kajendran@gmail.com). Please include the following details in your report: | ||
|
||
- Description of the issue, including steps to reproduce. | ||
- Version of the project where the issue was discovered. | ||
- Your name and contact information (optional). | ||
|
||
We will respond to security incidents as quickly as possible and keep you informed of our progress. | ||
|
||
## Responsible Disclosure | ||
|
||
We encourage responsible disclosure of security vulnerabilities. If you discover a vulnerability, we kindly request that you: | ||
|
||
- Notify us privately, providing sufficient details for us to reproduce and address the issue. | ||
- Avoid disclosing the issue publicly until we have had a chance to address it. | ||
- Do not exploit the vulnerability for malicious purposes. | ||
|
||
We appreciate your help in keeping our project secure. | ||
|
||
Thank you! | ||
|