|
| 1 | +# Security Policy |
| 2 | + |
| 3 | +## Supported Versions |
| 4 | + |
| 5 | +The following versions of this project are currently being supported with security updates. |
| 6 | + |
| 7 | +| Version | Supported | |
| 8 | +| ------- | ------------------ | |
| 9 | +| 1.3.1 | :white_check_mark: | |
| 10 | +| <1.3.0 | :x: | |
| 11 | + |
| 12 | +WP Engine takes the security of our software and services seriously, including all |
| 13 | +of the open-source code repositories managed through our |
| 14 | +[WP Engine organization](https://github.com/wpengine). |
| 15 | + |
| 16 | +## Reporting Security Issues |
| 17 | + |
| 18 | +If you believe you have found a security vulnerability in any Alley-owned |
| 19 | +repository, please report it to us via email at [email protected]. |
| 20 | + |
| 21 | +**Please do not report security vulnerabilities through public GitHub issues, |
| 22 | +discussions, or pull requests.** |
| 23 | + |
| 24 | +Please include as much of the information listed below as you can to help us |
| 25 | +better understand and resolve the issue: |
| 26 | + |
| 27 | +- The type of issue (e.g., buffer overflow, SQL injection, or cross-site |
| 28 | + scripting). |
| 29 | +- Full paths of the source file(s) related to the manifestation of the issue. |
| 30 | +- The location of the affected source code (tag/branch/commit or direct URL). |
| 31 | +- Any special configuration required to reproduce the issue. |
| 32 | +- Step-by-step instructions to reproduce the issue. |
| 33 | +- Proof-of-concept or exploit code (if possible). |
| 34 | +- Impact of the issue, including how an attacker might exploit the issue. |
| 35 | + |
| 36 | +This information will help us triage your report more quickly. Thank you for |
| 37 | +helping us keep WP Engine and our users safe! |
0 commit comments