Skip to content

Conversation

@jugmac00
Copy link
Member

Tidelift will coordinate the vulnerability and the fix with the tox team.

Tidelift will coordinate the vulnerability and the fix with the tox
team.
@jugmac00 jugmac00 requested a review from gaborbernat as a code owner May 11, 2025 21:16
@jugmac00
Copy link
Member Author

@gaborbernat As quickly discussed on discord, Tidelift reached out last week that we need to take care of some tasks, one of them was to add a way to report security issues with Tidelift. As soon this has been merged, I can finalize the last task, where I need to set the link to the file with the security notice.

@webknjaz
Copy link
Contributor

@jugmac00 make sure to add a SECURITY.md that would show up @ https://github.com/tox-dev/tox/security (it's one item missing from the checklist: https://github.com/tox-dev/tox/community).

Though, personally, I find it more convenient to enable submitting reports through the GH UI. There's a toggle @ https://github.com/tox-dev/tox/settings/security_analysis labeled Private vulnerability reporting where you can enable this. With that, people can suggest vulnerabilities, which can then be triaged and accepted/rejected, turned into draft, worked on. It also lets you create a private fork where both the reporter and the maintainers can collaborate through pull requests (that don't trigger CI or other automations, obviously) and finally publish, request a CVE, credit various contributing parties, invite more people to collaborate, etc.

So I'd recommend considering doing this (additionally or instead). I think it's possible to have the Tidelift process route incoming reports that way, too.

@jugmac00
Copy link
Member Author

@webknjaz thanks for your suggestions. Tide lift mentioned we could either put the info in the readme or in a standalone file. To get started, I went with the former approach. Are you aware of a good example for a security.md which we could use as an inspiration?

@webknjaz
Copy link
Contributor

It's important to have that file, since GH links it from various places in the UI. Including https://github.com/tox-dev/tox/issues/new/choose, which currently doesn't have a hint about security issues but should start displaying it once you add that file (example: https://github.com/aio-libs/yarl/issues/new/choose). Additionally to that automatically linked option, I sometimes an explicit link there too: https://github.com/aio-libs/yarl/blob/60f99a1/.github/ISSUE_TEMPLATE/config.yml#L8-L18.

I think you can point to another location from there if you want to host this information in another doc. Like this: https://github.com/ansible/pylibssh/security/policy.

Though, personally, I like including a more verbose guide: https://github.com/aio-libs/aiohttp/security/policy.

If you start by clicking the Propose button @ https://github.com/tox-dev/tox/community, it'll also have some initial template. You can place the file itself not only in the repo root, but alternatively under .github/ or docs/. I like using the docs/ variant since it's easy to then include it into the Sphinx site.

@webknjaz
Copy link
Contributor

I've also started linking the vulnerability form from the issue templates to target people trying to post a public issue before they get a chance to do it: https://github.com/aio-libs/yarl/issues/new?template=bug_report.yml. Here's what the form looks like, when you enable it: https://github.com/aio-libs/yarl/security/advisories/new (it's not configurable, same for everybody).

Copy link
Member

@gaborbernat gaborbernat left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, let's not add it here, and use Security.md instead.

@webknjaz
Copy link
Contributor

@gaborbernat did you close the PR by accident? I expect it could be updated to use a different file.

@gaborbernat
Copy link
Member

Given that we are changing entirely where and what we had, I thought we might as well just open a new PR.

@jugmac00
Copy link
Member Author

Thanks a lot, @webknjaz - your input is highly appreciated.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants