-
-
Notifications
You must be signed in to change notification settings - Fork 154
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
22b45c6
commit 6294f23
Showing
2 changed files
with
49 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
# Instructions for Using the Vulnerability Template | ||
|
||
1. **Copy the Template:** | ||
Start by making a copy of the `_template.md` file located in this directory. | ||
|
||
2. **Populate the Template:** | ||
Fill in the template with information about an important vulnerability that you have identified. Be as detailed and thorough as possible to ensure a clear understanding of the vulnerability. | ||
|
||
3. **Save Your Work:** | ||
Once you have populated the template, save your file with a name that follows the pattern: `YourName_VulnName.md`. This naming convention helps ensure uniqueness and reduce collisions. | ||
|
||
4. **Upload Your File:** | ||
Upload your completed vulnerability file back to this directory. | ||
|
||
Feel free to create as many entries as you like for different proposed vulnerability types. Please keep each vulnerability type to its own file to facilitate later processing. Thank you for your contribution! |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
|
||
|
||
## Risk/Vuln Name | ||
|
||
**Author(s):** | ||
|
||
Name of the author(s) who have contributed to documenting this vulnerability. | ||
|
||
### Description | ||
|
||
A brief description of the risk that includes its potential effects such as system compromises, data breaches, or other security concerns. | ||
|
||
### Common Examples of Risk | ||
|
||
1. Example 1: Specific instance or type of this risk. | ||
2. Example 2: Another instance or type of this risk. | ||
3. Example 3: Yet another instance or type of this risk. | ||
|
||
### Prevention and Mitigation Strategies | ||
|
||
1. Prevention Step 1: A step or strategy that can be used to prevent the risk or mitigate its effects. | ||
2. Prevention Step 2: Another prevention step or strategy. | ||
3. Prevention Step 3: Yet another prevention step or strategy. | ||
|
||
### Example Attack Scenarios | ||
|
||
Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this risk, including the attacker's actions and the potential outcomes. | ||
|
||
Scenario #2: Another example of an attack scenario showing a different way the risk could be exploited. | ||
|
||
### Reference Links | ||
|
||
1. [Link Title](URL): **Name of Outlet/Website/Whatever** (Arxiv papers should follow the citation guide posted with the article) | ||
2. [Link Title](URL): **Name of Outlet/Website/Whatever** (Arxiv papers should follow the citation guide posted with the article) |