Skip to content

docs: add SECURITY.md with private vulnerability reporting policy#1675

Merged
bdraco merged 1 commit into
masterfrom
add-security-policy
May 15, 2026
Merged

docs: add SECURITY.md with private vulnerability reporting policy#1675
bdraco merged 1 commit into
masterfrom
add-security-policy

Conversation

@bdraco
Copy link
Copy Markdown
Member

@bdraco bdraco commented May 15, 2026

Summary

Add a SECURITY.md that directs vulnerability reports through GitHub's private vulnerability reporting, so reporters have a documented private channel and aren't tempted to open a public issue or PR. Cross-reference the policy from CLAUDE.md so future LLM-assisted contributions route reports the same way.

Details

  • SECURITY.md — top-level file (where GitHub's Security tab looks for it). Names the supported channel, supported versions (latest 0.x), and an in-scope / out-of-scope list grounded in the project's actual attack surface: crafted mDNS / DNS-SD packets through DNSIncoming, cache, registry, listener callbacks; logic bugs that cross interface boundaries or hijack a name; build/packaging pipeline (build_ext.py, wheel contents, signed-release flow). Out of scope: things that are expected behaviour per RFC 6762 §21 (mDNS is unauthenticated by design).
  • CLAUDE.md — new ## Reporting security issues section between the build conventions and the entry-points table. Tells the LLM contributor not to open a public issue, PR, or commit naming the bug class and the affected code path when a user describes a suspected vulnerability; instead, point them at SECURITY.md / the private-reporting URL.

Test plan

  • SECURITY.md is discoverable via GitHub's Security tab after merge (/security/policy resolves).
  • The "Report a vulnerability" button on the Security tab leads to /security/advisories/new.
  • lint and commitlint jobs are green.

Document the supported channel for security reports: GitHub's
private vulnerability reporting feature
(/security/advisories/new). The policy also names scope and
out-of-scope cases, so reports about "a malicious LAN peer can
send packets" don't get filed as embargoed advisories.

Cross-reference from CLAUDE.md so an LLM acting on a user-
reported vulnerability points the user at the private route
instead of opening a public issue, PR, or commit naming the
affected code path.
@bdraco bdraco merged commit 13f9048 into master May 15, 2026
36 checks passed
@bdraco bdraco deleted the add-security-policy branch May 15, 2026 19:56
@codecov
Copy link
Copy Markdown

codecov Bot commented May 15, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 99.76%. Comparing base (72a0152) to head (61cbb1e).
⚠️ Report is 4 commits behind head on master.

Additional details and impacted files
@@           Coverage Diff           @@
##           master    #1675   +/-   ##
=======================================
  Coverage   99.76%   99.76%           
=======================================
  Files          33       33           
  Lines        3401     3401           
  Branches      461      461           
=======================================
  Hits         3393     3393           
  Misses          5        5           
  Partials        3        3           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@codspeed-hq
Copy link
Copy Markdown

codspeed-hq Bot commented May 15, 2026

Merging this PR will not alter performance

✅ 6 untouched benchmarks


Comparing add-security-policy (61cbb1e) with master (72a0152)

Open in CodSpeed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant