Skip to content

Commit f6a2c97

Browse files
authored
Merge pull request #6 from doublegate/claude/fix-mailto-security-model-018uXWoggzZ3wE5W4wBYVtkg
fix(docs): Convert mailto link to plain text in security-model.md
2 parents c6dd087 + 751fb12 commit f6a2c97

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

docs/src/security/security-model.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -631,7 +631,7 @@ RUSTFLAGS="-Z sanitizer=address" cargo test --target x86_64-unknown-linux-gnu
631631
**Responsible Disclosure**: ProRT-IP follows a coordinated vulnerability disclosure process.
632632

633633
**Reporting**:
634-
- **Email**: security@prtip.dev (PGP key: [0xABCD1234](https://keys.openpgp.org))
634+
- **Email**: security[at]prtip.dev (PGP key: [0xABCD1234](https://keys.openpgp.org))
635635
- **GitHub**: Private security advisory (https://github.com/doublegate/ProRT-IP/security/advisories/new)
636636

637637
**Response Timeline**:

docs/src/security/vulnerability-disclosure.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ProRT-IP's responsible disclosure policy for security vulnerabilities, bug bount
55
## Quick Reference
66

77
**Reporting Channels:**
8-
- **Email**: security@prtip.dev (PGP: `0xABCD1234`)
8+
- **Email**: security[at]prtip.dev (PGP: `0xABCD1234`)
99
- **GitHub**: [Private Security Advisory](https://github.com/doublegate/ProRT-IP/security/advisories/new)
1010
- **Urgent**: Contact maintainers directly for critical vulnerabilities
1111

@@ -74,10 +74,10 @@ Before reporting, collect:
7474
gpg --keyserver keys.openpgp.org --recv-keys 0xABCD1234
7575

7676
# Encrypt your report
77-
gpg --encrypt --armor --recipient security@prtip.dev report.txt
77+
gpg --encrypt --armor --recipient security[at]prtip.dev report.txt
7878

7979
# Send encrypted report
80-
cat report.txt.asc | mail -s "Security Vulnerability Report" security@prtip.dev
80+
cat report.txt.asc | mail -s "Security Vulnerability Report" security[at]prtip.dev
8181
```
8282

8383
**Option B: GitHub Security Advisory (Recommended)**
@@ -556,7 +556,7 @@ ProRT-IP agrees to:
556556

557557
### Security Team
558558

559-
**Primary Contact**: security@prtip.dev
559+
**Primary Contact**: security[at]prtip.dev
560560

561561
**PGP Public Key**:
562562
```
@@ -578,12 +578,12 @@ Available: https://keys.openpgp.org/
578578
### Mailing Lists
579579

580580
**Security Announcements** (planned):
581-
- Subscribe: security-announce@prtip.dev
581+
- Subscribe: security-announce[at]prtip.dev
582582
- Frequency: Only critical security updates
583583
- Archive: https://github.com/doublegate/ProRT-IP/discussions
584584

585585
**General Security Discussion** (planned):
586-
- Subscribe: security-discuss@prtip.dev
586+
- Subscribe: security-discuss[at]prtip.dev
587587
- Frequency: Community discussion, best practices
588588
- Archive: https://github.com/doublegate/ProRT-IP/discussions
589589

@@ -603,7 +603,7 @@ A: Yes! After coordinated disclosure, you are free to publish detailed write-ups
603603

604604
**Q: What if I accidentally trigger a vulnerability in production?**
605605

606-
A: Contact us immediately at security@prtip.dev. If it was unintentional and you report it promptly, we will not pursue legal action.
606+
A: Contact us immediately at security[at]prtip.dev. If it was unintentional and you report it promptly, we will not pursue legal action.
607607

608608
**Q: Do you assign CVEs?**
609609

@@ -789,7 +789,7 @@ ProRT-IP is vulnerable to SQL injection when storing scan results.
789789

790790
**Future Updates**: This policy will be reviewed annually and updated as needed. Major changes will be announced via security mailing list.
791791

792-
**Feedback**: Suggestions for improving this policy? Email security@prtip.dev or open a GitHub discussion.
792+
**Feedback**: Suggestions for improving this policy? Email security[at]prtip.dev or open a GitHub discussion.
793793

794794
---
795795

0 commit comments

Comments
 (0)