If anyone goes looking, you'll find examples are fairly disparate. Policies tend to evaporate not only due to lacking one, but also where projects already have a strong culture of responsible disclosure (the taken for granted factor ;)).
Paddy
Lukas Kahwe Smith
unread,
Nov 28, 2014, 3:27:05 AM11/28/14
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to padraic brady, php-fig-psr-...@googlegroups.com
this process also makes me wonder if we should also cover security procedure discovery. ie. a defined URL scheme .. like "[project url]/security" or something like that
> If anyone goes looking, you'll find examples are fairly disparate. Policies tend to evaporate not only due to lacking one, but also where projects already have a strong culture of responsible disclosure (the taken for granted factor ;)).
yeah some just provide an email or contact form .. some are more elaborate
Lukas Kahwe Smith
unread,
Dec 8, 2014, 8:11:23 AM12/8/14
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to padraic brady, php-fig-psr-...@googlegroups.com
Aloha,
Going through the list to look for some inspirations and patterns. I tried to collect this with some diligence but I am sure I missed a few things and hopefully do not misrepresent too many projects :)
---
First up I noticed that half of the projects offer “[main domain]/security” as the source for their security disclosure information (or at least as a redirect to them)
Interestingly only one project (Symfony) mentioned explicitly that the process includes getting a CVE identifier
---
Project offering bug bounties
* Magento
* Mozilla
—
Contacting:
* Most provide an email address like "security@[main domain]"
* Yii + Joomla provides a contact form (this seems highly risky, since the website itself is likely also hosted on code the same code base that might be affected)
* OpenBSD: personal email + public mailinglist
* ZendFramework uses zf-se...@zend.com * SugarCRM uses sec...@sugarcrm.com