Skip to content
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 8 additions & 20 deletions SECURITY.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,27 +2,15 @@

## Reporting a Vulnerability

If you discover a vulnerability in any of our projects, please follow these steps:
If you discover a security issue, please report it responsibly via [GitHub Security Advisories](https://docs.github.com/en/code-security/security-advisories) or email security@yourdomain.com.

1. **Do not disclose the vulnerability publicly** until it has been resolved.
2. **Contact us directly** at [security@khulnasoft.com](mailto:security@khulnasoft.com). Please include the following information in your report:
- A description of the vulnerability
- Steps to reproduce or a proof of concept (PoC)
- Any relevant system/environment details (e.g., OS version, software version)
3. **We will acknowledge receipt** of your report and work with you to resolve the issue.
4. Once resolved, the vulnerability will be disclosed publicly, with appropriate credit given.
## Security Roles

## Responsible Disclosure
- Security Maintainers: @username1, @username2
- Pentesters: @username3

We take security very seriously. Any security issue discovered should be reported directly to us, and we will ensure that the issue is patched and disclosed responsibly. By following this process, you help protect the integrity of this project and its users.
## Security Practices

## Vulnerability Disclosure Timeline

- **Day 0**: Vulnerability report received.
- **Day 1–3**: Acknowledgment and preliminary assessment.
- **Day 4–14**: Fix development and testing.
- **Day 15**: Public disclosure (with fixes) and credit given.

Please **do not** use the tools or exploits provided here to attack unauthorized systems. Follow legal guidelines in your local jurisdiction when testing systems.

Thank you for helping us keep our projects secure!
- Code review required for all merges.
- Automated security scanning in CI/CD.
- Regular dependency updates and audits.