Security policy
Reporting a vulnerability
shithub is pre-launch. The project does not yet have a dedicated security mailbox. For now, please open a private channel of communication with the maintainer (contact via GitHub) before disclosing publicly.
Once shithub launches at its public domain, this policy will be updated with:
- A dedicated
security@<domain>mailbox - A PGP public key for sensitive reports
- A response-time SLO (target: 72 hours initial acknowledgement)
- A scope statement covering the hosted instance plus the self-hosted code
- A coordinated-disclosure timeline
Out of scope (pre-launch)
- Findings against unreleased / pre-launch builds in development environments
- Issues that require a foothold the maintainer's machine to exploit
- Theoretical findings without a working proof of concept
In scope (once launched)
- Authentication / authorization bypasses
- Server-side request forgery
- Code injection (SQL, template, command, etc.)
- Cross-site scripting and CSRF
- Insecure cryptographic practices
- Resource exhaustion / denial-of-service vectors
- Information disclosure of private repo content
License
This document evolves with the project. See LICENSE for shithub's overall licensing terms.
View source
| 1 | # Security policy |
| 2 | |
| 3 | ## Reporting a vulnerability |
| 4 | |
| 5 | shithub is pre-launch. The project does not yet have a dedicated security mailbox. For now, please open a private channel of communication with the maintainer (contact via GitHub) before disclosing publicly. |
| 6 | |
| 7 | Once shithub launches at its public domain, this policy will be updated with: |
| 8 | |
| 9 | - A dedicated `security@<domain>` mailbox |
| 10 | - A PGP public key for sensitive reports |
| 11 | - A response-time SLO (target: 72 hours initial acknowledgement) |
| 12 | - A scope statement covering the hosted instance plus the self-hosted code |
| 13 | - A coordinated-disclosure timeline |
| 14 | |
| 15 | ## Out of scope (pre-launch) |
| 16 | |
| 17 | - Findings against unreleased / pre-launch builds in development environments |
| 18 | - Issues that require a foothold the maintainer's machine to exploit |
| 19 | - Theoretical findings without a working proof of concept |
| 20 | |
| 21 | ## In scope (once launched) |
| 22 | |
| 23 | - Authentication / authorization bypasses |
| 24 | - Server-side request forgery |
| 25 | - Code injection (SQL, template, command, etc.) |
| 26 | - Cross-site scripting and CSRF |
| 27 | - Insecure cryptographic practices |
| 28 | - Resource exhaustion / denial-of-service vectors |
| 29 | - Information disclosure of private repo content |
| 30 | |
| 31 | ## License |
| 32 | |
| 33 | This document evolves with the project. See [LICENSE](LICENSE) for shithub's overall licensing terms. |