Skip to content

Latest commit

Β 

History

History
102 lines (67 loc) Β· 3.83 KB

File metadata and controls

102 lines (67 loc) Β· 3.83 KB

πŸ”’ Security Policy

🚨 Supported Versions

We actively maintain security for the following versions:

Version Supported
2.0.x βœ… Yes
< 2.0 ❌ No

πŸ› Reporting a Vulnerability

We take the security of this template seriously. If you believe you have found a security vulnerability, please report it to us as described below.

πŸ“§ How to Report

Please do NOT report security vulnerabilities through public GitHub issues.

Instead, please report them via email to [INSERT SECURITY EMAIL].

You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message.

πŸ“‹ What to Include

Please include the following information in your report:

  • Type of issue (buffer overflow, SQL injection, cross-site scripting, etc.)
  • Full paths of source file(s) related to the vulnerability
  • The number of line(s) of code where the vulnerability can be observed
  • A description of the vulnerability
  • A description of how the vulnerability can be exploited
  • Proof-of-concept or exploit code (if possible)
  • Impact of the issue (data loss, system compromise, etc.)

πŸ” What Happens Next

  1. Acknowledgment: You will receive an acknowledgment within 48 hours
  2. Investigation: Our security team will investigate the report
  3. Updates: You will receive updates on the progress
  4. Resolution: Once resolved, we will:
    • Release a security update
    • Credit you in the security advisory (unless you prefer to remain anonymous)
    • Update the changelog

πŸ›‘οΈ Security Best Practices

πŸ” For Template Users

  • Keep dependencies updated - Regularly update your project dependencies
  • Review generated code - Always review code generated by scripts
  • Validate inputs - Ensure all user inputs are properly validated
  • Use secure defaults - Don't override security-related default settings
  • Monitor for updates - Watch for security updates to this template

πŸ§ͺ For Contributors

  • Follow secure coding practices - Use established security patterns
  • Validate all inputs - Never trust user input without validation
  • Use secure defaults - Implement secure-by-default configurations
  • Test security scenarios - Include security-focused tests
  • Review dependencies - Regularly review and update dependencies

πŸ”„ Security Updates

πŸ“… Update Schedule

  • Critical vulnerabilities: Immediate release (within 24 hours)
  • High severity: Within 72 hours
  • Medium severity: Within 1 week
  • Low severity: Within 1 month

πŸ“’ Notification Process

  • Security advisories will be published on GitHub
  • Release notes will include security-related changes
  • Email notifications for critical vulnerabilities (if you've reported issues)

πŸ† Security Hall of Fame

We gratefully acknowledge security researchers who have responsibly disclosed vulnerabilities:

  • [Your Name] - [Vulnerability Description] - [Date]

πŸ“š Additional Resources

🀝 Security Team

Our security team consists of:

  • Security Lead: [Name] - [Email]
  • Security Reviewers: [Names] - [Emails]

For project security practices and development guidelines, see contributing.md and code-of-conduct.md.


Thank you for helping keep our template secure! πŸ”’