-
-
Notifications
You must be signed in to change notification settings - Fork 513
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
35 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
# Security Policy | ||
|
||
## Supported Versions | ||
|
||
Security support status for currently maintained versions: | ||
|
||
| Version | Support Status | | ||
|---------|-----------------------| | ||
| 2.x | ✅ Actively Maintained | | ||
| 1.x | ❌ End of Life | | ||
|
||
## Vulnerability Reporting | ||
|
||
### Submit Vulnerability | ||
Please submit reports via [GitHub Security Advisory](https://github.com/0xJacky/nginx-ui/security/advisories/new) with: | ||
- Affected version(s) | ||
- Detailed vulnerability description | ||
- Reproducible PoC (Proof of Concept) | ||
- Environment configuration details | ||
|
||
### Handling Process | ||
- Valid reports will be tracked through private advisory channels | ||
- Within 21-31 days after remediation: | ||
- Request CVE identifier from numbering authorities | ||
- Publish technical details on GitHub Advisory | ||
- Update Release Notes with impact assessment | ||
|
||
### Requirements | ||
- **Testing Restrictions**: All security validation must be conducted in locally built isolated environments. Online demo systems are strictly prohibited for testing purposes | ||
- **Environment Isolation**: Testing environments must be network-segregated from production systems. Test traffic must not leak beyond isolated networks | ||
- Destructive testing is prohibited without explicit authorization | ||
- Adhere to Coordinated Disclosure principles | ||
- Vulnerability details must remain confidential until public disclosure | ||
|
||
> Security researchers will be acknowledged in project credits based on contribution significance |