Skip to content

Commit ec6cbdb

Browse files
authored
Merge pull request #26 from contentauth/update-sec-guidance
Update security guidance
2 parents c71425c + b7fd988 commit ec6cbdb

File tree

2 files changed

+24
-2
lines changed

2 files changed

+24
-2
lines changed

CONTRIBUTING.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,5 +78,5 @@ feel free to reach out to existing committers to have a conversation about that.
7878

7979
## Security issues
8080

81-
Security issues shouldn't be reported on this issue tracker. Instead,
82-
[file an issue to our security experts](https://helpx.adobe.com/security/alertus.html).
81+
Do not create a public GitHub issue for any suspected security vulnerabilities. Instead, please file an issue through [Adobe's HackerOne page](https://hackerone.com/adobe?type=team).
82+
For more information on reporting security issues, see [SECURITY.md](SECURITY.md).

SECURITY.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
# Security
2+
3+
This C2PA open-source library is maintained in partnership with Adobe. At this time, Adobe is taking point on accepting security reports through its HackerOne portal and public bug bounty program.
4+
5+
## Reporting a vulnerability
6+
7+
Please do not create a public GitHub issue for any suspected security vulnerabilities. Instead, please file an issue through [Adobe's HackerOne page](https://hackerone.com/adobe?type=team). If for some reason this is not possible, reach out to [email protected].
8+
9+
10+
## Vulnerability SLAs
11+
12+
Once we receive an actionable vulnerability (meaning there is an available patch, or a code fix is required), we will acknowledge the vulnerability within 24 hours. Our target SLAs for resolution are:
13+
14+
1. 72 hours for vulnerabilities with a CVSS score of 9.0-10.0
15+
2. 2 weeks for vulnerabilities with a CVSS score of 7.0-8.9
16+
17+
Any vulnerability with a score below 6.9 will be resolved when possible.
18+
19+
20+
## C2PA Vulnerabilities
21+
22+
This library is not meant to address any potential vulnerabilities within the C2PA specification itself. It is only an implementation of the spec as written. Any suspected vulnerabilities within the spec can be reported [here](https://github.com/c2pa-org/specifications/issues).

0 commit comments

Comments
 (0)