-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Description
Currently, security advisories are inconsistently documented here and here (for older lb2 vuln.).
They are also not known to the Node.js Security WG.
This may obscure security advisories from the end-user as they may depend on the messages appearing on npm install or npm audit, or through third-party tools such as Snyk.
From the Security | Node.js page:
Security bugs in third party modules should be reported to their respective maintainers and should also be coordinated through the Node.js Ecosystem Security Team via HackerOne.
Suggestion
-
Consolidate security advisories
The lb2 security advisories should be consolidated to the main security advisory page.
-
Revise security policy
In the spirit of fostering a safe, FOSS ecosystem, the project should adopt the Node.js Security WG Responsible Disclosure Policy to leverage a trusted vulnerability-reporting platform and bug bounty program (Node.js HackerOne programme).
-
Re-disclose old vulnerabilities
Existing vulnerabilities should be re-disclosed to the Node.js Security WG via HackerOne
- Security advisory 08-15-2018 (Not disclosed yet)
- Security advisory 08-08-2018 (Not disclosed yet)
- Security advisory 06-17-2019 (Disclosing....)
- Security advisory 01-31-2018 (Not disclosed yet)
- Security advisory 10-24-2017 (Not disclosed yet)
- Security advisory 09-21-2017 (Not disclosed yet)
- Security advisory 03-10-2017 (Not disclosed yet)
- Security advisory 08-16a-2016 (Not disclosed yet)
- Security advisory 08-16-2016 (Not disclosed yet)
- Security advisory 01-12-2016 (Not disclosed yet)
- Security advisory 06-04-2015 (Not disclosed yet)
- Security advisory 01-09-2015 (Not disclosed yet)
-
Add a
Responsible Disclosurebadge:
Existing Examples
Express (which was under IBM) adopts a variant of the policy. Though the Node.js Security WG encourages coordination via HackerOne.
Acceptance criteria
TBD - will be filled by the team.