Skip to content

Commit 93a09c6

Browse files
committed
Update security policy
1 parent 861f054 commit 93a09c6

File tree

1 file changed

+3
-47
lines changed

1 file changed

+3
-47
lines changed

SECURITY.md

Lines changed: 3 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
> | ❌{🐛} | **No (Issue):** Not supported due to confirmed contains bugs and/or issues. |
1212
> | ❌{🧓} | **No (Old):** Not supported due to too old. |
1313
14-
| **Releases / Tags / Versions** | **Status** | **Target - PowerShell** | **Target - NodeJS (Wrapper API)** | **Target - NPM (Wrapper API)** |
14+
| **Versions** | **Status** | **Target - PowerShell** | **Target - NodeJS (Wrapper API)** | **Target - NPM (Wrapper API)** |
1515
|:-:|:-:|:-:|:-:|:-:|
1616
| v1.2.X | L | >= v7.2.0 | >= v14.15.0 | *N/A* |
1717
| v1.1.X | L | >= v7.2.0 | >= v14.15.0 | >= v6.14.8 |
@@ -22,50 +22,6 @@
2222

2323
## Report Vulnerability
2424

25-
If you believe you have found any security vulnerability, please do not report it publicly! Instead, please report it via [the repository Security Advisories system](https://github.com/hugoalh-studio/ghactions-toolkit-powershell/security/advisories/new), [fill this form (legacy)](https://forms.gle/iYjv8jGqkBzjy9yW9), or send an e-mail (legacy).
25+
If you believe you have found any security vulnerability, please report it via [the Security Advisories system](https://github.com/hugoalh-studio/ghactions-toolkit-powershell/security/advisories/new) instead of create an issue and/or report it publicly.
2626

27-
All new reports may need up to `~48 hours (~2 days)` to begin the process.
28-
29-
> **📢 Security Vulnerability Report for GitHub repositories should report to their Security Advisories system:**
30-
>
31-
> GitHub now introduced private vulnerability reporting, a dedicated communications channel where the community can disclose security issues directly on GitHub, and allow security researchers to report vulnerabilities securely in the repository.
32-
>
33-
> For the instruction on how to submit a security vulnerability report via the new Security Advisories system, please visit "[Creating a repository security advisory](https://docs.github.com/en/code-security/security-advisories/repository-security-advisories/creating-a-repository-security-advisory)".
34-
35-
> **⚠ Important:**
36-
>
37-
> All legacy reports will only proceed to further process while:
38-
>
39-
> - with the correct personal information of the reporter, and
40-
> - with the correct project's ID or repository URI.
41-
>
42-
> Otherwise the report will mark as invalid immediately, not proceed, and without any notification.
43-
44-
### Via Send An E-mail
45-
46-
Send an e-mail to either one who listed in here (e-mail address is listed in the profile):
47-
48-
- [hugoalh](https://github.com/hugoalh)
49-
50-
#### Suggested Content List
51-
52-
Please provide as much as you can to help the security vulnerability report supervisors for better understand the nature, scope of the possible issues, and triage your report more quickly.
53-
54-
- Your account's platform (e.g.: GitHub, GitLab, ...).
55-
- Your account's username (e.g.: `@octocat`).
56-
- Project's ID or repository URI.
57-
- Project's ID is displayed at the top part of the Readme (file: `README.md`), below the project display name (i.e.: header), inside a code block.
58-
- Affected branches, commits, releases, tags, and/or versions.
59-
- Versions must be listed as supported.
60-
- For multiple versions, you can use version range instead.
61-
- Affected files.
62-
- Files which related to the manifestation of this security vulnerability.
63-
- Relative files' paths based on repository root.
64-
- Issues to cause this security vulnerability (e.g.: buffer overflow, cross-site scripting, SQL injection, ...).
65-
- Any special/specific configuration required to reproduce this security vulnerability?
66-
- Steps' instructions to reproduce this security vulnerability.
67-
- Proof of concept and/or exploit code.
68-
- How an attacker might exploit this security vulnerability?
69-
- References of this security vulnerability.
70-
- Common Vulnerabilities and Exposures (CVE) IDs.
71-
- Common Weakness Enumerator (CWE) IDs.
27+
All new reports may need `~48 hours (~2 days)` to begin the process.

0 commit comments

Comments
 (0)