|
11 | 11 | > | ❌{🐛} | **No (Issue):** Not supported due to confirmed contains bugs and/or issues. |
|
12 | 12 | > | ❌{🧓} | **No (Old):** Not supported due to too old. |
|
13 | 13 |
|
14 |
| -| **Releases / Tags / Versions** | **Status** | **Target - PowerShell** | **Target - NodeJS (Wrapper API)** | **Target - NPM (Wrapper API)** | |
| 14 | +| **Versions** | **Status** | **Target - PowerShell** | **Target - NodeJS (Wrapper API)** | **Target - NPM (Wrapper API)** | |
15 | 15 | |:-:|:-:|:-:|:-:|:-:|
|
16 | 16 | | v1.2.X | L | >= v7.2.0 | >= v14.15.0 | *N/A* |
|
17 | 17 | | v1.1.X | L | >= v7.2.0 | >= v14.15.0 | >= v6.14.8 |
|
|
22 | 22 |
|
23 | 23 | ## Report Vulnerability
|
24 | 24 |
|
25 |
| -If you believe you have found any security vulnerability, please do not report it publicly! Instead, please report it via [the repository Security Advisories system](https://github.com/hugoalh-studio/ghactions-toolkit-powershell/security/advisories/new), [fill this form (legacy)](https://forms.gle/iYjv8jGqkBzjy9yW9), or send an e-mail (legacy). |
| 25 | +If you believe you have found any security vulnerability, please report it via [the Security Advisories system](https://github.com/hugoalh-studio/ghactions-toolkit-powershell/security/advisories/new) instead of create an issue and/or report it publicly. |
26 | 26 |
|
27 |
| -All new reports may need up to `~48 hours (~2 days)` to begin the process. |
28 |
| - |
29 |
| -> **📢 Security Vulnerability Report for GitHub repositories should report to their Security Advisories system:** |
30 |
| -> |
31 |
| -> GitHub now introduced private vulnerability reporting, a dedicated communications channel where the community can disclose security issues directly on GitHub, and allow security researchers to report vulnerabilities securely in the repository. |
32 |
| -> |
33 |
| -> For the instruction on how to submit a security vulnerability report via the new Security Advisories system, please visit "[Creating a repository security advisory](https://docs.github.com/en/code-security/security-advisories/repository-security-advisories/creating-a-repository-security-advisory)". |
34 |
| -
|
35 |
| -> **⚠ Important:** |
36 |
| -> |
37 |
| -> All legacy reports will only proceed to further process while: |
38 |
| -> |
39 |
| -> - with the correct personal information of the reporter, and |
40 |
| -> - with the correct project's ID or repository URI. |
41 |
| -> |
42 |
| -> Otherwise the report will mark as invalid immediately, not proceed, and without any notification. |
43 |
| -
|
44 |
| -### Via Send An E-mail |
45 |
| - |
46 |
| -Send an e-mail to either one who listed in here (e-mail address is listed in the profile): |
47 |
| - |
48 |
| -- [hugoalh](https://github.com/hugoalh) |
49 |
| - |
50 |
| -#### Suggested Content List |
51 |
| - |
52 |
| -Please provide as much as you can to help the security vulnerability report supervisors for better understand the nature, scope of the possible issues, and triage your report more quickly. |
53 |
| - |
54 |
| -- Your account's platform (e.g.: GitHub, GitLab, ...). |
55 |
| -- Your account's username (e.g.: `@octocat`). |
56 |
| -- Project's ID or repository URI. |
57 |
| - - Project's ID is displayed at the top part of the Readme (file: `README.md`), below the project display name (i.e.: header), inside a code block. |
58 |
| -- Affected branches, commits, releases, tags, and/or versions. |
59 |
| - - Versions must be listed as supported. |
60 |
| - - For multiple versions, you can use version range instead. |
61 |
| -- Affected files. |
62 |
| - - Files which related to the manifestation of this security vulnerability. |
63 |
| - - Relative files' paths based on repository root. |
64 |
| -- Issues to cause this security vulnerability (e.g.: buffer overflow, cross-site scripting, SQL injection, ...). |
65 |
| -- Any special/specific configuration required to reproduce this security vulnerability? |
66 |
| -- Steps' instructions to reproduce this security vulnerability. |
67 |
| -- Proof of concept and/or exploit code. |
68 |
| - - How an attacker might exploit this security vulnerability? |
69 |
| -- References of this security vulnerability. |
70 |
| - - Common Vulnerabilities and Exposures (CVE) IDs. |
71 |
| - - Common Weakness Enumerator (CWE) IDs. |
| 27 | +All new reports may need `~48 hours (~2 days)` to begin the process. |
0 commit comments