Skip to content

Commit dd311fb

Browse files
author
Medha
committed
Add SECURITY.md file for vulnerability reporting
1 parent da34432 commit dd311fb

File tree

1 file changed

+50
-0
lines changed

1 file changed

+50
-0
lines changed

security.md

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
# Security Policy
2+
3+
## Reporting a Vulnerability
4+
5+
If you believe you've found a security vulnerability in **TheAlgorithms/Python**, please follow these steps to report it:
6+
7+
1. **Do not open an issue or pull request**: To ensure that the vulnerability is handled responsibly and securely, please **do not create a public issue or PR**. This will allow us to address the issue in a secure manner before any information becomes public.
8+
9+
2. **Contact the maintainers**: Send a detailed description of the vulnerability to **[[email protected]]**. Please include the following information:
10+
- A description of the vulnerability.
11+
- Steps to reproduce the issue, if applicable.
12+
- Any relevant code or configuration files.
13+
- Your contact details (optional).
14+
15+
If you don't have a direct contact, feel free to create a private email or open a responsible disclosure channel via GitHub Discussions, with a direct request to the maintainers.
16+
17+
3. **Timeline for Response**: We strive to respond to all security reports within 48 hours. The severity of the issue may affect the response time.
18+
19+
## Security Measures
20+
21+
- **Vulnerability Fixes**: Once a vulnerability is identified and reported, we will work to fix it as soon as possible. We will issue a patch release if necessary.
22+
- **Security Advisory**: We will provide a public security advisory with the details of the vulnerability, once the patch has been released. This advisory will include steps for users to mitigate the issue.
23+
24+
## Secure Coding Practices
25+
26+
We follow the best practices in secure coding to ensure our code is resilient against common security vulnerabilities, including but not limited to:
27+
- Input validation and sanitization
28+
- Secure handling of sensitive data (e.g., passwords, API keys)
29+
- Proper encryption and decryption mechanisms
30+
- Avoiding common vulnerabilities such as SQL injection, cross-site scripting (XSS), and buffer overflows
31+
32+
## Data Handling
33+
34+
We recommend that contributors and users do not store sensitive data (such as passwords or private keys) in the repository. Any sensitive information should be handled securely, using appropriate encryption or key management tools.
35+
36+
## Patching and Updates
37+
38+
We encourage contributors to regularly update dependencies to minimize security vulnerabilities in third-party libraries.
39+
40+
## Additional Resources
41+
42+
For more information on secure coding practices and related resources, you can refer to:
43+
- [OWASP Top 10](https://owasp.org/www-project-top-ten/)
44+
- [CWE - Common Weakness Enumeration](https://cwe.mitre.org/)
45+
46+
## Responsible Disclosure
47+
48+
We adhere to responsible disclosure practices and ask that any vulnerabilities be reported privately. We are committed to working with the security community to address any issues as quickly and efficiently as possible.
49+
50+
---

0 commit comments

Comments
 (0)