Skip to content

Security: scthornton/scthornton.github.io

Security

SECURITY.md

Security Policy

Personal Blog on GitHub Pages

This repository contains the source code for a personal technical blog hosted on GitHub Pages. The blog focuses on AI/ML, security, networking, and programming topics based on 25+ years of professional experience.

Blog Purpose

scthornton.github.io provides:

  • ✅ Technical blog posts and articles
  • ✅ Tutorials and guides
  • ✅ Cheatsheets and quick references
  • ✅ Professional insights and experiences
  • ✅ Educational content for technology professionals

Important: This is a public blog. All content is educational and based on publicly available information.

Content Guidelines

Authorized Content

Permitted:

  • Educational technical content
  • Publicly available information
  • Personal insights and experiences
  • Open-source code examples
  • References to public resources
  • Academic and industry research

Not Permitted:

  • Proprietary or confidential information
  • Non-public company data or strategies
  • Personally identifiable information (PII)
  • Security vulnerabilities without responsible disclosure
  • Malicious code or exploits

Security Considerations

Blog Security

  • All content is static HTML generated by Jekyll
  • No server-side processing or databases
  • GitHub Pages provides hosting infrastructure
  • HTTPS enabled for all connections

Code Examples

When including code in blog posts:

  • Use sanitized, educational examples only
  • Never include real credentials or API keys
  • Remove sensitive information before publishing
  • Follow responsible disclosure for vulnerabilities
  • Include appropriate security warnings

External Links

  • All external links reviewed before publication
  • No links to malicious or harmful content
  • Attribution provided for referenced materials
  • Compliance with copyright and fair use

Reporting Security Issues

Blog Content Issues

If you find security-sensitive information inappropriately disclosed:

Email: scott@perfecxion.ai

Please include:

  • URL of the blog post
  • Description of the security concern
  • Suggested action (removal, redaction, etc.)

Response Timeline

  • Initial Response: Within 24 hours
  • Assessment: Within 48 hours
  • Resolution: Immediate removal if security-critical

Supported Versions

Version Supported
main

Best Practices

For Content Authors

  1. Review Before Publishing

    • Check for sensitive information
    • Verify all code examples are safe
    • Ensure proper attribution
    • Test all links and examples
  2. Responsible Disclosure

    • Never publish exploits without vendor coordination
    • Follow 90-day disclosure timelines
    • Provide context and mitigations
    • Focus on education, not exploitation
  3. Privacy Protection

    • Remove personal information from examples
    • Sanitize logs and configurations
    • Use placeholder values for sensitive data
    • Respect confidentiality agreements
  4. Copyright Compliance

    • Respect intellectual property
    • Provide proper attribution
    • Follow fair use guidelines
    • Link to original sources

For Readers

  1. Use Content Responsibly

    • Educational purposes only
    • Respect all applicable laws
    • Don't misuse code examples
    • Verify before implementing
  2. Provide Feedback

    • Report errors or issues
    • Suggest improvements
    • Share constructive feedback
    • Respect author's time

Jekyll Security

Static Site Security

  • No database or server-side code
  • All content pre-generated as HTML
  • GitHub Pages handles hosting security
  • HTTPS encryption for all traffic

Dependency Management

  • Regular Jekyll and plugin updates
  • Review third-party themes and plugins
  • Minimal JavaScript for enhanced security
  • No user-submitted content

Privacy

Analytics

  • No tracking scripts or analytics by default
  • No cookies or local storage
  • No collection of personal information
  • GitHub Pages may collect aggregate statistics

Comments

  • No built-in comment system
  • External commenting systems (if added) follow their privacy policies
  • Users responsible for data shared in comments

Contact

For questions about blog content, security concerns, or technical topics, contact scott@perfecxion.ai.

There aren’t any published security advisories