-
-
Notifications
You must be signed in to change notification settings - Fork 4.8k
Adds infos about vulnerability disclosures #4413
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov Report
@@ Coverage Diff @@
## master #4413 +/- ##
=======================================
Coverage 92.66% 92.66%
=======================================
Files 118 118
Lines 8346 8346
=======================================
Hits 7734 7734
Misses 612 612
Continue to review full report at Codecov.
|
The French Approves 🙏 |
You French for real? |
Not at all. I’m going to learn French next year. It will be fun. |
Ahah! Awesome! |
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is good. It's about time we had a serious statement about how we handle such issues. We may want to specify a minimum amount of time that should be expected before we can a) respond and b) be able to fix the issue, depending on severity.
Good idea, feel free to edit directly in github! |
Just changed the language regarding timetables from first contact to patch applied. If the wording looks good I actually want to change both of those values to days, 7 and 30 respectively. |
Yep that's good to me! |
@flovilmart Looking back at this I'm wondering if we should also consider adding a small section to the README as well, just pointing to SECURITY.md? |
Yes, I was realizing it earlier this morning, also probably on http://parseplatform.org and http://docs.parseplatform.org |
Wouldn't be a bad idea |
The wording on the responsible disclosure policy looks like it's for a hosted service. |
Which part? We can always improve! |
Sorry. I realized after I posted that it was really vague. It refers to accessing individual user accounts. Sounds like Parse.com security policy more than a self-hosted open source server. |
Yeah, in the sense that one would be able to poke the accounts / setups of parse-server users and exploit the said vulnerabilities. |
Yes, but there is no need for that to be allowable. A security researcher should be able to self-host. They never had that option on Parse.com so an exception would have needed to be made to allow vulnerability discovery. The Parse Platform project cannot authorize people to do penetration testing of other people's servers... so unless you have a sample where people can poke around this doesn't seem like a valid policy. |
Sorry... I sound unintentionally negative. Aside from that point this is great work and should serve as an example of responsibility to the community. |
I would like to make it better, with your help, feel free to rephrase, edit in a subsequent PR. Even if the ‘account’ is inaccurate, because we don’t host user accounts, it would still be possible for one to test against live deployments of parse-servers, based on discoveries of public data (logs shared etc...). This sentence would encompass that, I’d like a better phrasing too. |
* Create SECURITY.md * Update SECURITY.md * Update SECURITY.md * Update ISSUE_TEMPLATE.md * Update ISSUE_TEMPLATE.md * Clarify time table from contact to fix * change times to days
* Create SECURITY.md * Update SECURITY.md * Update SECURITY.md * Update ISSUE_TEMPLATE.md * Update ISSUE_TEMPLATE.md * Clarify time table from contact to fix * change times to days
No description provided.