Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Responsible security disclosures #326

Closed
tobie opened this issue Sep 18, 2019 · 18 comments
Closed

Responsible security disclosures #326

tobie opened this issue Sep 18, 2019 · 18 comments

Comments

@tobie
Copy link
Contributor

tobie commented Sep 18, 2019

Is there a standard way for OpenJSF projects to accept responsible security disclosures or is the expectation that projects set up their own solution?

Node.js has its own policy, for example. I don't know about other projects.

I feel like it would be nice if this was something the foundation handled for projects (even if the project would be the one responsible for dealing with the disclosure itself).

@wesleytodd
Copy link
Contributor

Related: nodejs/package-maintenance#159

Our Node WG has been having some discussions around this. If the foundation was going to have something it should align with what the Maintenance WG and Security WG recommend.

@MylesBorins
Copy link
Contributor

MylesBorins commented Sep 18, 2019 via email

@mhdawson
Copy link
Member

mhdawson commented Sep 23, 2019

The Node.js security working group also does work in this area, and HackerOne who we work with handle the CVEs for the ecosytem reports. I've pinged that team through nodejs/security-wg#578

@mhdawson
Copy link
Member

There have been discussions as to wether part of the Node.js security-wg which focuses on ecosystem triage should move up to the OpenJS level. This is probably a good time to continue that discussion. @sam-github

@sam-github
Copy link

nodejs/security-wg#579 relates to this slightly, in that if the responsibilities of the nodejs/security-wg become more clearly and singularly focussed on the Ecosystem outside Node.js, they might be a candidate to move up a level.

Also, note that even though many, perhaps most, of the vulns in the DB are reported against "Node.js" packages, a number of those packages can also run in the browser, and there are at least a handful (or were, last time I surveyed them a couple years ago) that are npm package that run ONLY in the browser, so the WG is already in some sense collecting and triaging non-Node.js vulnerabilities.

@MarcinHoppe
Copy link
Contributor

I brought this up some weeks ago when triaging a report of a vulnerability in a React component: clearly only intended to work in the browser but still distributed via the npm.

I would definitely be up for discussion about taking our work in the Node.js ecosystem triage team to the OpenJS foundation level.

@mhdawson
Copy link
Member

mhdawson commented Oct 8, 2019

Created nodejs/security-wg#589

@mhdawson
Copy link
Member

mhdawson commented Nov 5, 2019

PR in package main repo which is related: nodejs/package-maintenance#277

@MarcinHoppe
Copy link
Contributor

I am back on track on this one and will have a revised version ready for the next round of reviews before the end of this week.

Thanks all for your patience about it.

@MarcinHoppe
Copy link
Contributor

I added a new file with requirements, I'd love some feedback about it on the PR: #489 (comment).

@tobie
Copy link
Contributor Author

tobie commented May 29, 2020

Thanks. Looped-in AMP‘s security team.

@mhdawson
Copy link
Member

PR to move guidelines to stage 2 - #566. Thanks @MarcinHoppe

@mhdawson
Copy link
Member

Last step is to move to stage 3, @MarcinHoppe do you want to open the PR to move to stage 3.

@MarcinHoppe
Copy link
Contributor

MarcinHoppe commented Jul 29, 2020

@mhdawson I opened #602 #633 to move the proposal to stage 3.

@MarcinHoppe
Copy link
Contributor

Thanks for merging #633. Are we good to close this issue?

@tobie
Copy link
Contributor Author

tobie commented Sep 16, 2020

Hell ya! Thanks for your work!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

9 participants