Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Proposal] Prefer GitHub-based security vulnerability reporting workflow #75

Open
yurishkuro opened this issue Jan 18, 2023 · 2 comments

Comments

@yurishkuro
Copy link
Member

yurishkuro commented Jan 18, 2023

Our current policy (added in open-telemetry/.github#1) is to report security vulnerabilities to TC via encrypted email. GitHub now supports reporting vulnerabilities directly to maintainers of a specific repository (Example: https://github.com/open-telemetry/opentelemetry-cpp/security/advisories).

I propose to change our policy to prefer this new method of reporting over emails to TC, because it makes the handling of security issues more decentralized and goes directly to the respective repo maintainers, instead of being channeled through TC (which creates an unnecessary bottleneck). The encrypted email to TC workflow will remain as a fallback method.

image

@MadVikingGod
Copy link

I think this is a good idea. Some questions I have:

  • Should the maintainers notify the TC that they have a reported vulnerability, if so what time frame?
  • Is there a way to automate that reporting?
  • How would we as an organization test that reports are being received, and acted upon?

@yurishkuro
Copy link
Member Author

@MadVikingGod I think relying on automation would be ideal. There are GitHub APIs for accessing advisories and vulnerabilities (eg https://docs.github.com/en/graphql/reference/objects#securityadvisory). I don't know if just the reports can be accessible, since until an advisory is published it's hidden from the public.

@mtwo mtwo transferred this issue from open-telemetry/community Oct 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants