You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CONTRIBUTING.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,5 +78,5 @@ feel free to reach out to existing committers to have a conversation about that.
78
78
79
79
## Security issues
80
80
81
-
Security issues shouldn't be reported on this issue tracker. Instead,
82
-
[file an issue to our security experts](https://helpx.adobe.com/security/alertus.html).
81
+
Do not create a public GitHub issue for any suspected security vulnerabilities. Instead, please file an issue through [Adobe's HackerOne page](https://hackerone.com/adobe?type=team).
82
+
For more information on reporting security issues, see [SECURITY.md](SECURITY.md).
Copy file name to clipboardExpand all lines: README.md
+21-3Lines changed: 21 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Import the API as follows:
36
36
from c2pa import*
37
37
```
38
38
39
-
### Read and validate C2PA data in a file
39
+
### Read and validate C2PA data in a file or stream
40
40
41
41
Use the `Reader` to read C2PA data from the specified file.
42
42
This examines the specified media file for C2PA data and generates a report of any data it finds. If there are validation errors, the report includes a `validation_status` field. For a summary of supported media types, see [Supported file formats](#supported-file-formats).
@@ -48,7 +48,12 @@ The manifests may contain binary resources such as thumbnails which can be retri
48
48
NOTE: For a comprehensive reference to the JSON manifest structure, see the [Manifest store reference](https://opensource.contentauthenticity.org/docs/manifest/manifest-ref).
This C2PA open-source library is maintained in partnership with Adobe. At this time, Adobe is taking point on accepting security reports through its HackerOne portal and public bug bounty program.
4
+
5
+
## Reporting a vulnerability
6
+
7
+
Please do not create a public GitHub issue for any suspected security vulnerabilities. Instead, please file an issue through [Adobe's HackerOne page](https://hackerone.com/adobe?type=team). If for some reason this is not possible, reach out to [email protected].
8
+
9
+
10
+
## Vulnerability SLAs
11
+
12
+
Once we receive an actionable vulnerability (meaning there is an available patch, or a code fix is required), we will acknowledge the vulnerability within 24 hours. Our target SLAs for resolution are:
13
+
14
+
1. 72 hours for vulnerabilities with a CVSS score of 9.0-10.0
15
+
2. 2 weeks for vulnerabilities with a CVSS score of 7.0-8.9
16
+
17
+
Any vulnerability with a score below 6.9 will be resolved when possible.
18
+
19
+
20
+
## C2PA Vulnerabilities
21
+
22
+
This library is not meant to address any potential vulnerabilities within the C2PA specification itself. It is only an implementation of the spec as written. Any suspected vulnerabilities within the spec can be reported [here](https://github.com/c2pa-org/specifications/issues).
0 commit comments