You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -225,6 +225,7 @@ classDiagram
225
225
### Security
226
226
227
227
The library uses RestrictedPython to create a sandboxed environment for Python execution, preventing potentially harmful operations while allowing controlled script execution.
228
+
Also, you can acknowledge the security policy of the project [here](https://github.com/w4t3rcs/spring-boot-python-executor/blob/master/SECURITY.md).
228
229
229
230
### Cache
230
231
@@ -519,7 +520,8 @@ This environment variable allows you to specify additional Python packages to in
519
520
520
521
## 💻 Usage Examples
521
522
522
-
If you want to check out how the library works, you can check `demo-app` module or examples below
523
+
If you want to check out how the library works,
524
+
you can check [demo-app](https://github.com/w4t3rcs/spring-boot-python-executor/tree/master/demo-app) module or examples below
| All active major releases |**Only the latest minor version** of each supported major release will receive security updates. |
13
+
| End-of-life major releases | Not supported — no security updates will be provided. |
14
14
15
15
**Notes**
16
16
- “Latest minor version” means the most recent `x.y.z` published for a given major `x` at the time of the report. Consumers are encouraged to run the latest minor release within each major line to receive security fixes.
@@ -40,7 +40,7 @@ Please provide as much of the following information as you can to help us triage
40
40
-**Logs, stack traces, configuration files** (masked for secrets where appropriate).
41
41
-**Any mitigation or workaround** you believe is relevant.
42
42
43
-
We treat sensitive attachments as confidential. If you need to send large files, ask first and we will provide guidance.
43
+
We treat sensitive attachments as confidential. If you need to send large files, ask first, and we will provide guidance.
44
44
45
45
---
46
46
@@ -51,22 +51,22 @@ We treat sensitive attachments as confidential. If you need to send large files,
51
51
52
52
**Triage and response**
53
53
- Initial triage and severity classification will be completed within **7 calendar days**.
54
-
- For confirmed issues we will:
54
+
- For confirmed issues, we will:
55
55
- Assign a severity level and create an internal ticket.
56
-
- Work on a fix or mitigation plan. For high- and critical-severity issues we will prioritize immediate mitigation.
56
+
- Work on a fix or mitigation plan. For high- and critical-severity issues, we will prioritize immediate mitigation.
57
57
- Where necessary, coordinate with downstream consumers and the maintainers of related projects.
58
58
59
59
**Fix and release timeline**
60
60
- For **critical** vulnerabilities that enable remote code execution, data exfiltration, or other severe impacts, we will aim to provide a patch or mitigation **as quickly as feasible**, typically within **14 days**, and publish a security release as soon as the fix has been validated.
61
61
- For **high** severity issues, we aim for a fix within **30 days**.
62
-
- For **medium/low** severity issues, fixes will be scheduled according to maintenance cycles but we will endeavor to address them in a timely manner.
62
+
- For **medium/low** severity issues, fixes will be scheduled according to maintenance cycles, but we will endeavor to address them in a timely manner.
63
63
- If a longer remediation window is required (for example, because a fix risks breaking backward compatibility), we will communicate a mitigation plan and a public timeline to the reporter and coordinate on disclosure.
64
64
65
65
**Coordinated disclosure**
66
66
- We prefer coordinated disclosure: we will **not** disclose the vulnerability publicly until:
67
67
1. a fix or mitigation is available (or an agreed workaround is published), and
68
68
2. any required advisories and release notes are prepared.
69
-
- We will coordinate with the reporter on timing of the public disclosure and crediting. If you prefer to remain anonymous, tell us in the report and we will respect that preference.
69
+
- We will coordinate with the reporter on the timing of the public disclosure and crediting. If you prefer to remain anonymous, tell us in the report, and we will respect that preference.
70
70
71
71
---
72
72
@@ -97,7 +97,7 @@ We treat sensitive attachments as confidential. If you need to send large files,
97
97
---
98
98
99
99
## Credits
100
-
We appreciate the time and effort of security researchers who help improve this project. Reporters who assist with responsible disclosure and permit acknowledgement will be credited in release notes unless they request anonymity.
100
+
We appreciate the time and effort of security researchers who help improve this project. Reporters who help with responsible disclosure and permit acknowledgement will be credited in release notes unless they request anonymity.
0 commit comments