|
| 1 | +# Fluxgate Responsible Disclosure Protocol |
| 2 | + |
| 3 | +When Fluxgate's batch scanning identifies vulnerable workflows in |
| 4 | +public repositories, we follow this responsible disclosure process: |
| 5 | + |
| 6 | +## Timeline |
| 7 | +1. **Day 0:** Finding identified during batch scan |
| 8 | +2. **Day 1-3:** Finding verified manually (not a false positive) |
| 9 | +3. **Day 3-7:** Maintainer contacted via: |
| 10 | + - Repository SECURITY.md contact (preferred) |
| 11 | + - Security advisory on the repository (if enabled) |
| 12 | + - Direct email to listed maintainers (fallback) |
| 13 | +4. **Day 7:** Confirmation of receipt requested |
| 14 | +5. **Day 37:** If no response, second notification attempt |
| 15 | +6. **Day 67:** Public disclosure of aggregate statistics |
| 16 | + (vulnerable repos are NOT named if unpatched) |
| 17 | + |
| 18 | +## What We Disclose Publicly |
| 19 | +- Aggregate statistics (X of Y repos affected) |
| 20 | +- Rule descriptions and detection logic |
| 21 | +- Example vulnerable patterns (synthetic, not from real repos) |
| 22 | +- Remediation guidance |
| 23 | + |
| 24 | +## What We Do NOT Disclose Publicly |
| 25 | +- Names of affected repositories (until patched or 90-day window expires) |
| 26 | +- Specific workflow file contents from unpatched repos |
| 27 | +- Details that would enable exploitation |
| 28 | + |
| 29 | +## Exceptions |
| 30 | +- If a vulnerability is already being actively exploited in the wild |
| 31 | + (as with the Trivy compromise), we may accelerate the timeline |
| 32 | +- If a maintainer requests extended time, we will accommodate up to |
| 33 | + 180 days for complex remediations |
| 34 | + |
| 35 | +## Contact |
| 36 | +If you believe Fluxgate has identified a vulnerability in your |
| 37 | +repository and you'd like to coordinate, contact: |
| 38 | +christopherdlusk@gmail.com or open a GitHub Security Advisory. |
0 commit comments