Skip to content

Commit 81f7dc3

Browse files
authored
chore: create SECURITY.md (#1841)
chore: create SECURITY.md
1 parent 31d573d commit 81f7dc3

File tree

1 file changed

+40
-0
lines changed

1 file changed

+40
-0
lines changed

SECURITY.md

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
# Security Policy
2+
3+
## Reporting a Vulnerability
4+
5+
### Types of Security Issues
6+
We actively monitor:
7+
- Code vulnerabilities (RCE, XSS, authentication bypass)
8+
- Dependency risks (critical vulnerabilities in project dependencies, such as requirements.txt, pyproject.toml, or equivalent files)
9+
- Configuration flaws (insecure defaults in deployment scripts)
10+
11+
### Disclosure Channels (Choose one):
12+
13+
1. **Encrypted Email**
14+
Contact: `[email protected]`
15+
*Subject format: `[SECURITY] ModuleName - Brief Description`*
16+
17+
2. **GitHub Private Report**
18+
Use GitHub's ["Report a vulnerability"](https://github.com/Megvii-BaseDetection/YOLOX/security/advisories) feature
19+
20+
3. **Reporting Security Issues**
21+
Please report security issues using Create new issue: https://github.com/Megvii-BaseDetection/YOLOX/issues/new
22+
23+
24+
## Response Process
25+
1. **Acknowledgement**
26+
- Initial response within **48 business hours**
27+
2. **Assessment**
28+
- Triage using CVSS v3.1 scoring
29+
3. **Remediation**
30+
- Critical (CVSS ≥9.0): Patch within **7 days**
31+
- High (CVSS 7-8.9): Patch within **30 days**
32+
4. **Public Disclosure**
33+
- Published via [GitHub Advisories](https://github.com/Megvii-BaseDetection/YOLOX/security/advisories)
34+
- CVE assignment coordinated with [MITRE](https://cveform.mitre.org)
35+
36+
## Secure Development Practices
37+
- Always verify hashes when downloading dependencies:
38+
```bash
39+
sha256sum -c <your-dependency-hash-file>
40+
```

0 commit comments

Comments
 (0)