Skip to content

Commit cb8bcfe

Browse files
docs: update security policy for vulnerability reporting
- Revised the security policy to clarify the reporting process for vulnerabilities. - Added detailed sections on scope, reporting requirements, and our commitment to addressing reported issues. - Emphasized the importance of not disclosing vulnerabilities publicly and provided guidance on how to report them securely. - Included a new section on coordinated disclosure and safe harbor provisions for ethical reporting. Co-authored-by: Greyson LaLonde <[email protected]>
1 parent 13a514f commit cb8bcfe

File tree

1 file changed

+43
-20
lines changed

1 file changed

+43
-20
lines changed

.github/security.md

Lines changed: 43 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,50 @@
1-
## CrewAI Security Vulnerability Reporting Policy
1+
## CrewAI Security Policy
22

3-
CrewAI prioritizes the security of our software products, services, and GitHub repositories. To promptly address vulnerabilities, follow these steps for reporting security issues:
3+
We are committed to protecting the confidentiality, integrity, and availability of the CrewAI ecosystem. This policy explains how to report potential vulnerabilities and what you can expect from us when you do.
44

5-
### Reporting Process
6-
Do **not** report vulnerabilities via public GitHub issues.
5+
### Scope
76

8-
Email all vulnerability reports directly to:
9-
7+
We welcome reports for vulnerabilities that could impact:
108

11-
### Required Information
12-
To help us quickly validate and remediate the issue, your report must include:
9+
- CrewAI-maintained source code and repositories
10+
- CrewAI-operated infrastructure and services
11+
- Official CrewAI releases, packages, and distributions
1312

14-
- **Vulnerability Type:** Clearly state the vulnerability type (e.g., SQL injection, XSS, privilege escalation).
15-
- **Affected Source Code:** Provide full file paths and direct URLs (branch, tag, or commit).
16-
- **Reproduction Steps:** Include detailed, step-by-step instructions. Screenshots are recommended.
17-
- **Special Configuration:** Document any special settings or configurations required to reproduce.
18-
- **Proof-of-Concept (PoC):** Provide exploit or PoC code (if available).
19-
- **Impact Assessment:** Clearly explain the severity and potential exploitation scenarios.
13+
Issues affecting clearly unaffiliated third-party services or user-generated content are out of scope, unless you can demonstrate a direct impact on CrewAI systems or customers.
2014

21-
### Our Response
22-
- We will acknowledge receipt of your report promptly via your provided email.
23-
- Confirmed vulnerabilities will receive priority remediation based on severity.
24-
- Patches will be released as swiftly as possible following verification.
15+
### How to Report
2516

26-
### Reward Notice
27-
Currently, we do not offer a bug bounty program. Rewards, if issued, are discretionary.
17+
- **Please do not** disclose vulnerabilities via public GitHub issues, pull requests, or social media.
18+
- Email detailed reports to **[email protected]** with the subject line `Security Report`.
19+
- If you need to share large files or sensitive artifacts, mention it in your email and we will coordinate a secure transfer method.
20+
21+
### What to Include
22+
23+
Providing comprehensive information enables us to validate the issue quickly:
24+
25+
- **Vulnerability overview** — a concise description and classification (e.g., RCE, privilege escalation)
26+
- **Affected components** — repository, branch, tag, or deployed service along with relevant file paths or endpoints
27+
- **Reproduction steps** — detailed, step-by-step instructions; include logs, screenshots, or screen recordings when helpful
28+
- **Proof-of-concept** — exploit details or code that demonstrates the impact (if available)
29+
- **Impact analysis** — severity assessment, potential exploitation scenarios, and any prerequisites or special configurations
30+
31+
### Our Commitment
32+
33+
- **Acknowledgement:** We aim to acknowledge your report within two business days.
34+
- **Communication:** We will keep you informed about triage results, remediation progress, and planned release timelines.
35+
- **Resolution:** Confirmed vulnerabilities will be prioritized based on severity and fixed as quickly as possible.
36+
- **Recognition:** We currently do not run a bug bounty program; any rewards or recognition are issued at CrewAI's discretion.
37+
38+
### Coordinated Disclosure
39+
40+
We ask that you allow us a reasonable window to investigate and remediate confirmed issues before any public disclosure. We will coordinate publication timelines with you whenever possible.
41+
42+
### Safe Harbor
43+
44+
We will not pursue or support legal action against individuals who, in good faith:
45+
46+
- Follow this policy and refrain from violating any applicable laws
47+
- Avoid privacy violations, data destruction, or service disruption
48+
- Limit testing to systems in scope and respect rate limits and terms of service
49+
50+
If you are unsure whether your testing is covered, please contact us at **[email protected]** before proceeding.

0 commit comments

Comments
 (0)