|
1 | 1 | # Security Policy
|
2 | 2 |
|
3 |
| -## Supported Version |
| 3 | +## Supported Versions |
4 | 4 |
|
5 | 5 | > | **Legend** | **Description** |
|
6 | 6 | > |:-:|:--|
|
7 | 7 | > | L | **LTS:** Long term supported. |
|
8 | 8 | > | ✔ | **Active / Current:** Currently supported. |
|
9 |
| -> | 👎{🐛} | **Partly (Issue):** Partly supported due to confirmed contains bugs and/or issues. | |
10 |
| -> | 👎{🧓} | **Partly (Old):** Partly supported due to deprecated by newer versions. | |
| 9 | +> | 👎{🐛} | **Partially (Issue):** Partially supported due to confirmed contains bugs and/or issues. | |
| 10 | +> | 👎{🧓} | **Partially (Old):** Partially supported due to deprecated by newer versions. | |
11 | 11 | > | ❌{🐛} | **No (Issue):** Not supported due to confirmed contains bugs and/or issues. |
|
12 | 12 | > | ❌{🧓} | **No (Old):** Not supported due to too old. |
|
13 | 13 |
|
14 |
| -| **Tag / Version** | **Target** | **Support** | |
15 |
| -|:-:|:-:|:-:| |
16 |
| -| v0.5.X | PowerShell v7.2.0 | ✔ | |
17 |
| -| v0.5.0 \~ v0.5.3 | PowerShell v7.2.0 | 👎{🐛} | |
18 |
| -| v0.4.X | PowerShell v7.2.0 | 👎{🧓} | |
19 |
| -| v0.3.X | PowerShell v7.2.0 | 👎{🧓} | |
20 |
| -| v0.3.0 \~ v0.3.2 | PowerShell v7.2.0 | ❌{🐛🧓} | |
21 |
| -| v0.2.X | PowerShell v7.2.0 | ❌{🧓} | |
22 |
| -| < v0.2.X | PowerShell v7.2.0 | ❌{🐛🧓} | |
| 14 | +| **Versions** | **Status** | **Target - PowerShell** | **Target - NodeJS (Wrapper API)** | **Target - NPM (Wrapper API)** | |
| 15 | +|:-:|:-:|:-:|:-:|:-:| |
| 16 | +| v0.5.X | ✔ | >= v7.2.0 | >= 14.15.0 | >= v6.14.8 | |
| 17 | +| v0.5.0 \~ v0.5.3 | 👎{🐛} | >= v7.2.0 | >= 14.15.0 | >= v6.14.8 | |
| 18 | +| v0.4.X | 👎{🧓} | >= v7.2.0 | *N/A* | *N/A* | |
| 19 | +| v0.3.X | 👎{🧓} | >= v7.2.0 | *N/A* | *N/A* | |
| 20 | +| v0.3.0 \~ v0.3.2 | ❌{🐛🧓} | >= v7.2.0 | *N/A* | *N/A* | |
| 21 | +| v0.2.X | ❌{🧓} | >= v7.2.0 | *N/A* | *N/A* | |
| 22 | +| < v0.2.X | ❌{🐛🧓} | >= v7.2.0 | *N/A* | *N/A* | |
23 | 23 |
|
24 | 24 | ## Report Vulnerability
|
25 | 25 |
|
26 |
| -### Contact |
| 26 | +If you believe you have found any security vulnerability, please do not report it publicly! Instead, please report it via [fill this form](https://forms.gle/iYjv8jGqkBzjy9yW9) or send an e-mail. |
27 | 27 |
|
28 |
| -Send an email to anyone who listed in here (click the link to obtain the email address): |
| 28 | +All new reports may need up to `~48 hours (~2 days)` to begin the process. |
| 29 | + |
| 30 | +> **⚠ Important:** |
| 31 | +> |
| 32 | +> All reports will only proceed to further process while: |
| 33 | +> |
| 34 | +> - with the correct personal information of the reporter, and |
| 35 | +> - with the correct project's ID or repository URI. |
| 36 | +> |
| 37 | +> Otherwise the report will mark as invalid immediately, not proceed, and without any notification. |
| 38 | +
|
| 39 | +### Via Send An E-mail |
| 40 | + |
| 41 | +Send an e-mail to either one who listed in here (e-mail address is listed in the profile): |
29 | 42 |
|
30 | 43 | - [hugoalh](https://github.com/hugoalh)
|
31 | 44 |
|
32 |
| -### Suggested Content List |
| 45 | +#### Suggested Content List |
| 46 | + |
| 47 | +Please provide as much as you can to help the security vulnerability report supervisors for better understand the nature, scope of the possible issues, and triage your report more quickly. |
33 | 48 |
|
34 |
| -- Your GitHub account username (e.g.: `@octocat`) |
35 |
| -- Project identification name |
36 |
| -- Affected versions (versions must be listed as supported) |
37 |
| -- Affected files |
38 |
| -- Issues to cause this security issue |
39 |
| -- Common Vulnerabilities and Exposures (CVE) identification numbers |
40 |
| -- References of this security issue |
| 49 | +- Your account's platform (e.g.: GitHub, GitLab, ...). |
| 50 | +- Your account's username (e.g.: `@octocat`). |
| 51 | +- Project's ID or repository URI. |
| 52 | + - Project's ID is displayed at the top part of readme (i.e.: `README` file), below the project display name (i.e.: header), inside a code block. |
| 53 | +- Affected branches, commits, tags, and/or versions. |
| 54 | + - Versions must be listed as supported. |
| 55 | + - For multiple versions, you can use version range instead. |
| 56 | +- Affected files. |
| 57 | + - Files which related to the manifestation of this security vulnerability. |
| 58 | + - Relative files' paths based on repository root. |
| 59 | +- Issues to cause this security vulnerability (e.g.: buffer overflow, cross-site scripting, SQL injection, ...). |
| 60 | +- Any special/specific configuration required to reproduce this security vulnerability? |
| 61 | +- Steps' instructions to reproduce this security vulnerability. |
| 62 | +- Proof of concept and/or exploit code. |
| 63 | + - How an attacker might exploit this security vulnerability? |
| 64 | +- References of this security vulnerability. |
| 65 | + - Common Vulnerabilities and Exposures (CVE) IDs. |
| 66 | + - Common Weakness Enumerator (CWE) IDs. |
0 commit comments