Skip to content

Commit 1de91e9

Browse files
authored
Create SECURITY.md
Signed-off-by: Gideon Selorm Ayivi <88237474+SelormDev@users.noreply.github.com>
1 parent 9504ce1 commit 1de91e9

File tree

1 file changed

+52
-0
lines changed

1 file changed

+52
-0
lines changed

SECURITY.md

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
# Security Policy
2+
3+
---
4+
5+
## Supported Versions
6+
7+
| Version | Supported |
8+
|----------|--------------------|
9+
| Main | :white_check_mark: |
10+
| Others | :x: |
11+
12+
Only the `main` branch is actively monitored for security issues. Ensure you are using the latest version of the repository.
13+
14+
---
15+
16+
## Reporting a Vulnerability
17+
18+
If you discover a security vulnerability, please report it responsibly by following these steps:
19+
20+
1. **Contact Me Directly**
21+
Send me an [email](mailto:info@selormdev.com) with the subject line: `Security Vulnerability Report`.
22+
Include:
23+
- A detailed description of the vulnerability.
24+
- Steps to reproduce the issue.
25+
- Any additional information that might be helpful.
26+
27+
2. **Do Not Disclose Publicly**
28+
Please avoid public discussions about the vulnerability until it has been addressed.
29+
30+
3. **Acknowledgment**
31+
I will acknowledge your report within 48 hours and work towards resolving the issue promptly.
32+
33+
---
34+
35+
## Vulnerability Management
36+
37+
Once a security issue is reported:
38+
1. The issue will be reviewed and verified.
39+
2. A fix will be implemented and tested.
40+
3. A patch will be released and communicated in the repository.
41+
42+
---
43+
44+
## General Security Practices
45+
46+
While this repository is primarily for coursework and personal use:
47+
- Ensure you only use trusted external resources or dependencies.
48+
- Avoid exposing sensitive information like API keys or personal data.
49+
50+
---
51+
52+
Thank you for helping to keep this repository secure! This document outlines the security practices and how to report vulnerabilities.

0 commit comments

Comments
 (0)