Skip to content

Commit 73d65ed

Browse files
BagToadCopilot
andcommitted
Document dependency CVE policy in SECURITY.md
Clarify that a dependency having a CVE does not mean gh has a vulnerability. We use govulncheck for reachability analysis and ask reporters to demonstrate impact before we act on dependency CVE reports. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
1 parent 97ba17b commit 73d65ed

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

.github/SECURITY.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ If you believe you have found a security vulnerability in GitHub CLI, you can re
1111

1212
**Please do not report security vulnerabilities through public GitHub issues, discussions, or pull requests.**
1313

14+
A dependency having a CVE does not mean `gh` has a vulnerability. We use [`govulncheck`](https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck) to determine whether vulnerable symbols are actually reachable from `gh`'s code. If you are reporting a dependency CVE, please include evidence that the issue is exploitable in `gh`: a call chain into the affected symbols or a proof of concept. Reports that only list a dependency version and CVE without demonstrating impact will be closed.
15+
1416
Thanks for helping make GitHub safe for everyone.
1517

1618
[private vulnerability reporting]: https://github.com/cli/cli/security/advisories

0 commit comments

Comments
 (0)