Skip to content

Create SECURITY.md for vulnerability reporting#725

Open
acornall wants to merge 1 commit intoveraPDF:integrationfrom
acornall:patch-1
Open

Create SECURITY.md for vulnerability reporting#725
acornall wants to merge 1 commit intoveraPDF:integrationfrom
acornall:patch-1

Conversation

@acornall
Copy link

@acornall acornall commented Mar 12, 2026

Hey team I'd like to propose adding a security policy for reporting vulnerabilities in this project. The included policy is just an example based on other open source projects and can be adjusted to your liking. Some common approaches are:

  • Offering alternative disclosure via email
  • Other private custom communication paths

Summary by CodeRabbit

  • Documentation
    • Added security vulnerability reporting policy outlining the process for responsible disclosure, including submission guidelines and a 90-day window for remediation prior to public disclosure.

Added a security policy for reporting vulnerabilities.
@coderabbitai
Copy link

coderabbitai bot commented Mar 12, 2026

📝 Walkthrough

Walkthrough

A new SECURITY.md file is added, establishing a vulnerability reporting policy that directs security issues to GitHub's advisory workflow, specifies required details, and defines a 90-day remediation timeline before public disclosure.

Changes

Cohort / File(s) Summary
Security Policy
SECURITY.md
New vulnerability reporting policy directing researchers to submit through GitHub advisories with required vulnerability details and 90-day fix window.

Estimated code review effort

🎯 1 (Trivial) | ⏱️ ~3 minutes

Poem

🐰✨ A bunny's whisper, soft and clear,
"Report bugs safely, no need to fear!"
Through GitHub's halls your secrets go,
Ninety days to patch and mow.
Security blooms where trust takes root! 🌿

🚥 Pre-merge checks | ✅ 3
✅ Passed checks (3 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The pull request title clearly and accurately describes the main change: adding a new SECURITY.md file for vulnerability reporting.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (1)
SECURITY.md (1)

16-16: Soften the fixed 90-day disclosure rule.

A hard 90-day requirement reads rigid for critical or actively exploited issues. Safer wording is to make this a target and say disclosure timing will be coordinated based on severity and remediation progress.

Proposed wording
-Please allow us 90 days to work on a fix before public disclosure.
+We aim to remediate reported vulnerabilities within 90 days and will coordinate
+public disclosure timing with the reporter based on severity and fix availability.
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@SECURITY.md` at line 16, Replace the rigid sentence "Please allow us 90 days
to work on a fix before public disclosure." with softer, target-based disclosure
language: state that 90 days is the target timeline but that disclosure timing
will be coordinated based on severity and remediation progress, and add a line
committing to communication and reasonable extensions for active exploitation or
critical fixes (identify the exact sentence to change and update it in
SECURITY.md).
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@SECURITY.md`:
- Around line 3-8: Update SECURITY.md to add a fallback private reporting
channel alongside the existing GitHub advisory link: keep the existing paragraph
and link text but append a sentence offering an alternative contact method
(e.g., a dedicated security@ or PGP-encrypted email address and instructions for
encryption) for reporters who cannot use GitHub; ensure the new sentence
references the current “Report a vulnerability” flow and provides clear, brief
instructions for using the fallback channel and any required metadata
(vulnerability summary, reproduction steps, contact preference).

---

Nitpick comments:
In `@SECURITY.md`:
- Line 16: Replace the rigid sentence "Please allow us 90 days to work on a fix
before public disclosure." with softer, target-based disclosure language: state
that 90 days is the target timeline but that disclosure timing will be
coordinated based on severity and remediation progress, and add a line
committing to communication and reasonable extensions for active exploitation or
critical fixes (identify the exact sentence to change and update it in
SECURITY.md).

ℹ️ Review info
⚙️ Run configuration

Configuration used: defaults

Review profile: CHILL

Plan: Pro

Run ID: e53756ed-53b1-462f-b909-6b1f82c16895

📥 Commits

Reviewing files that changed from the base of the PR and between 3d66afc and ef03998.

📒 Files selected for processing (1)
  • SECURITY.md

Comment on lines +3 to +8
If you have discovered a security vulnerability in this project, please report it
privately. **Do not disclose it as a public issue.** This gives us time to work with you
to fix the issue before public exposure, reducing the chance that the exploit will be
used before a patch is released.

Please submit reports via the [Report a vulnerability](https://github.com/veraPDF/veraPDF-validation/security/advisories/new) button.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion | 🟠 Major

Add a fallback private reporting channel.

Right now the policy only offers GitHub's advisory workflow. If a reporter cannot use GitHub or that flow is unavailable, there is no private path left for disclosure.

Proposed wording
 If you have discovered a security vulnerability in this project, please report it
 privately. **Do not disclose it as a public issue.** This gives us time to work with you
 to fix the issue before public exposure, reducing the chance that the exploit will be
 used before a patch is released.
 
 Please submit reports via the [Report a vulnerability](https://github.com/veraPDF/veraPDF-validation/security/advisories/new) button.
+If you cannot use that workflow, please contact the maintainers through an alternate
+private channel (for example, a dedicated security email address).
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
If you have discovered a security vulnerability in this project, please report it
privately. **Do not disclose it as a public issue.** This gives us time to work with you
to fix the issue before public exposure, reducing the chance that the exploit will be
used before a patch is released.
Please submit reports via the [Report a vulnerability](https://github.com/veraPDF/veraPDF-validation/security/advisories/new) button.
If you have discovered a security vulnerability in this project, please report it
privately. **Do not disclose it as a public issue.** This gives us time to work with you
to fix the issue before public exposure, reducing the chance that the exploit will be
used before a patch is released.
Please submit reports via the [Report a vulnerability](https://github.com/veraPDF/veraPDF-validation/security/advisories/new) button.
If you cannot use that workflow, please contact the maintainers through an alternate
private channel (for example, a dedicated security email address).
🧰 Tools
🪛 LanguageTool

[style] ~5-~5: Consider using a different verb for a more formal wording.
Context: ... This gives us time to work with you to fix the issue before public exposure, reduc...

(FIX_RESOLVE)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@SECURITY.md` around lines 3 - 8, Update SECURITY.md to add a fallback private
reporting channel alongside the existing GitHub advisory link: keep the existing
paragraph and link text but append a sentence offering an alternative contact
method (e.g., a dedicated security@ or PGP-encrypted email address and
instructions for encryption) for reporters who cannot use GitHub; ensure the new
sentence references the current “Report a vulnerability” flow and provides
clear, brief instructions for using the fallback channel and any required
metadata (vulnerability summary, reproduction steps, contact preference).

@bdoubrov
Copy link
Contributor

@acornall thanks a lot for the suggestion. I do confirm we take it very seriously, but need a bit of time to review it also in scope EU CRA act.

@acornall
Copy link
Author

No worries @bdoubrov let me know if I can be of assistance

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants