Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

increasing the clarity on the vulnerability reporting process #1736

Merged
merged 7 commits into from
Oct 13, 2020
Merged

Conversation

chayim
Copy link
Contributor

@chayim chayim commented Oct 8, 2020

Our vulnerability reporting process is reasonably clear, but the guidelines for getting a higher value vulnerability report need some tweaking. I felt that:

  1. Vulnerability reporting really does deserve it's own top-level page, like other organizations.

  2. The 1 day (to respond) timeline is far too quick - and having now viewed several other organization, I have data on that. The result is a table containing expectations as a response - an experiment to see if others find it easier to understand (as I do).

  3. We ought clarify what constitutes a higher quality vulnerability report.

Please provide comments, I'd like to turn this into a higher value page, as I think it can help us get down the path to higher value vulnerabilities. Finally, I validated our amounts with the few organizations I found possible. Paypal and Github have maximums of $30K. This, along with our existing bounty pay outs lead me to feel that our existing amount is well positioned given our size and scale as a result.

Co-authored-by: Quinn Keast <qkeast@sourcegraph.com>
@chayim chayim marked this pull request as ready for review October 8, 2020 08:34
@sourcegraph-bot
Copy link
Contributor

sourcegraph-bot commented Oct 8, 2020

Notifying subscribers in CODENOTIFY files for diff 37fd5a6...499d569.

Notify File(s)
@nicksnyder handbook/engineering/security/index.md
handbook/engineering/security/reporting-vulnerabilities.md
@sourcegraph/security handbook/engineering/security/index.md
handbook/engineering/security/reporting-vulnerabilities.md

Copy link
Contributor

@ElizabethStirling ElizabethStirling left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks great! Thanks so much for hammering this out!

Copy link
Contributor

@nicksnyder nicksnyder left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

handbook/engineering/security/reporting-vulnerabilities.md Outdated Show resolved Hide resolved
handbook/engineering/security/reporting-vulnerabilities.md Outdated Show resolved Hide resolved
| Type of Response | Time to Response |
| :------------- | :----------: |
| First Response| 2 days |
| Time to Triage | 10 days |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think it is clear to the reader what "triage" means.

handbook/engineering/security/reporting-vulnerabilities.md Outdated Show resolved Hide resolved
handbook/engineering/security/reporting-vulnerabilities.md Outdated Show resolved Hide resolved

## How we respond to security vulnerability reports

When we receive [a report of a security vulnerability](#how-to-report-a-security-vulnerability), a member of our security team determines if a reported vulnerability should be investigated by an engineer.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This self-referential link is dead.


We will send payment to a valid PayPal account. We will ask you for the name and country associated with your PayPal account.

**Timelines**
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the first section you say we respond within 2 US business days, but it is unclear in this table whether these are also all US business days.

chayim and others added 5 commits October 11, 2020 10:30
Co-authored-by: Nick Snyder <nick@sourcegraph.com>
Co-authored-by: Nick Snyder <nick@sourcegraph.com>
Co-authored-by: Nick Snyder <nick@sourcegraph.com>
Co-authored-by: Nick Snyder <nick@sourcegraph.com>
@chayim chayim merged commit 626531e into main Oct 13, 2020
@chayim chayim deleted the ck-patch-1 branch October 13, 2020 09:25
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants