diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 6a747c3..1d6c4ff 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -2,6 +2,10 @@ Thanks for your interest. This project follows the **gaebal-gajae pinpoint cadence** — see [ROADMAP.md](./ROADMAP.md) for the current pinpoint census. Here's how to contribute effectively. +## Security + +For security vulnerabilities, see [SECURITY.md](./SECURITY.md). **Do not file public pinpoints for security issues.** + ## Filing a ROADMAP Pinpoint All feature requests and bug reports go through the pinpoint format (see `ROADMAP.md`). Each pinpoint must have: diff --git a/SECURITY.md b/SECURITY.md new file mode 100644 index 0000000..9d2ede5 --- /dev/null +++ b/SECURITY.md @@ -0,0 +1,49 @@ +# Security Policy + +## Supported Versions + +This project is pre-1.0 / active development. Only the `main` branch (and the current active feature branch) receives security attention. No LTS commitment exists yet. + +| Branch | Supported | +|--------|-----------| +| `main` | ✅ | +| older forks/branches | ❌ | + +## Reporting a Vulnerability + +**Do not file a public GitHub issue for security vulnerabilities.** + +Please use [GitHub Security Advisories](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability) to report privately: + +1. Go to the **Security** tab of this repository +2. Click **"Report a vulnerability"** +3. Describe the issue with reproduction steps and impact + +We aim to acknowledge within **72 hours** and work toward coordinated disclosure. + +## Disclosure Process + +1. Report received → acknowledgement within 72h +2. We assess severity and reproduce the issue +3. Fix developed and reviewed privately +4. Fix shipped; advisory published after patch is live +5. Credit given to reporter (unless they prefer anonymity) + +## Scope + +**In scope:** +- Remote code execution (RCE) +- Authentication or authorization bypass +- Secrets / credentials exfiltration +- Sandbox escape (agent isolation boundary violations) +- Privilege escalation + +**Out of scope:** +- Denial of service (DoS/resource exhaustion) +- Social engineering attacks +- Vulnerabilities in third-party dependencies — report those upstream +- Behavior that is working as intended (check ROADMAP.md pinpoints first) + +## License + +This project is [MIT-licensed](./LICENSE) — provided as-is, without warranty of any kind.