update security guidelines and vulnerability reporting
This commit is contained in:
@@ -65,6 +65,7 @@ We follow responsible disclosure practices:
|
|||||||
### Vulnerability Categories We're Interested In
|
### Vulnerability Categories We're Interested In
|
||||||
|
|
||||||
**High Priority:**
|
**High Priority:**
|
||||||
|
|
||||||
- Memory safety violations
|
- Memory safety violations
|
||||||
- Privilege escalation
|
- Privilege escalation
|
||||||
- Code injection vulnerabilities
|
- Code injection vulnerabilities
|
||||||
@@ -72,11 +73,13 @@ We follow responsible disclosure practices:
|
|||||||
- Sensitive data exposure
|
- Sensitive data exposure
|
||||||
|
|
||||||
**Medium Priority:**
|
**Medium Priority:**
|
||||||
|
|
||||||
- Denial of service
|
- Denial of service
|
||||||
- Information disclosure
|
- Information disclosure
|
||||||
- Logic flaws in detection algorithms
|
- Logic flaws in detection algorithms
|
||||||
|
|
||||||
**Out of Scope:**
|
**Out of Scope:**
|
||||||
|
|
||||||
- Issues requiring physical access
|
- Issues requiring physical access
|
||||||
- Social engineering attacks
|
- Social engineering attacks
|
||||||
- Third-party dependency vulnerabilities (unless exploitable through Ghost)
|
- Third-party dependency vulnerabilities (unless exploitable through Ghost)
|
||||||
|
|||||||
Reference in New Issue
Block a user