@@ -11,7 +11,7 @@ We release patches for security vulnerabilities in the following versions:
1111
1212## Reporting a Vulnerability
1313
14- We take the security of SarifMark seriously. If you believe you have found a security vulnerability, please report it
14+ We take the security of Template DotNet Tool seriously. If you believe you have found a security vulnerability, please report it
1515to us as described below.
1616
1717### How to Report
@@ -60,31 +60,31 @@ Security updates will be released as:
6060
6161## Security Best Practices
6262
63- When using SarifMark , we recommend following these security best practices:
63+ When using Template DotNet Tool , we recommend following these security best practices:
6464
6565### Input Validation
6666
6767- Validate SARIF analysis tools API responses before processing
6868- Be cautious when processing data from untrusted sources
69- - Use the latest version of SarifMark to benefit from security updates
69+ - Use the latest version of Template DotNet Tool to benefit from security updates
7070
7171### Dependencies
7272
73- - Keep SarifMark and its dependencies up to date
73+ - Keep Template DotNet Tool and its dependencies up to date
7474- Review the release notes for security-related updates
7575- Use ` dotnet list package --vulnerable ` to check for vulnerable dependencies
7676
7777### Execution Environment
7878
79- - Run SarifMark with the minimum required permissions
80- - Avoid running SarifMark as a privileged user unless necessary
79+ - Run Template DotNet Tool with the minimum required permissions
80+ - Avoid running Template DotNet Tool as a privileged user unless necessary
8181- Validate API tokens and credentials are stored securely
8282
8383## Known Security Considerations
8484
8585### API Integration
8686
87- SarifMark integrates with SARIF analysis tools APIs. Users should:
87+ Template DotNet Tool integrates with SARIF analysis tools APIs. Users should:
8888
8989- Protect API tokens and credentials
9090- Use HTTPS connections to SARIF analysis tools
@@ -93,7 +93,7 @@ SarifMark integrates with SARIF analysis tools APIs. Users should:
9393
9494### File System Access
9595
96- SarifMark reads and writes files on the local file system. Users should:
96+ Template DotNet Tool reads and writes files on the local file system. Users should:
9797
9898- Ensure appropriate file permissions are set on output files
9999- Be cautious when processing files in shared directories
@@ -116,7 +116,7 @@ We will credit security researchers who report vulnerabilities responsibly. If y
116116
117117## Third-Party Dependencies
118118
119- SarifMark relies on third-party packages. We:
119+ Template DotNet Tool relies on third-party packages. We:
120120
121121- Regularly update dependencies to address known vulnerabilities
122122- Use Dependabot to monitor for security updates
@@ -141,9 +141,9 @@ For general bugs and feature requests, please use [GitHub Issues][issues].
141141- [ .NET Security Best Practices] [ dotnet-security ]
142142- [ GitHub Security Advisories] [ security-advisories ]
143143
144- Thank you for helping keep SarifMark and its users safe!
144+ Thank you for helping keep Template DotNet Tool and its users safe!
145145
146- [ security-advisories ] : https://github.com/demaconsulting/SarifMark /security/advisories
147- [ issues ] : https://github.com/demaconsulting/SarifMark /issues
146+ [ security-advisories ] : https://github.com/demaconsulting/TemplateDotNetTool /security/advisories
147+ [ issues ] : https://github.com/demaconsulting/TemplateDotNetTool /issues
148148[ owasp-practices ] : https://owasp.org/www-project-secure-coding-practices-quick-reference-guide/
149149[ dotnet-security ] : https://learn.microsoft.com/en-us/dotnet/standard/security/
0 commit comments