secure-dep-scanner
Version:
A comprehensive security scanner for detecting suspicious dependencies, malicious packages, and vulnerabilities in Node.js projects.
110 lines (79 loc) • 3.74 kB
Markdown
# Security Policy
## Supported Versions
We actively maintain and provide security updates for the following versions:
| Version | Supported |
| ------- | ------------------ |
| 1.0.x | :white_check_mark: |
## Reporting a Vulnerability
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
### 1. **DO NOT** create a public GitHub issue
Security vulnerabilities should be reported privately to avoid potential exploitation.
### 2. Contact Information
- **Email**: contato@livresoltech.com
- **Subject**: `[SECURITY] Vulnerability Report - secure-dep-scanner`
- **Response Time**: We aim to respond within 24-48 hours
### 3. Include in Your Report
- **Description**: Clear description of the vulnerability
- **Steps to Reproduce**: Detailed steps to reproduce the issue
- **Impact**: Potential impact and severity assessment
- **Environment**: OS, Node.js version, and any relevant details
- **Proof of Concept**: If applicable, include a safe PoC
### 4. What Happens Next
1. **Acknowledgment**: You'll receive an acknowledgment within 48 hours
2. **Investigation**: Our security team will investigate the report
3. **Updates**: We'll keep you informed of our progress
4. **Fix**: We'll develop and test a fix
5. **Disclosure**: We'll coordinate disclosure with you
## Security Best Practices
### For Users
- **Keep Updated**: Always use the latest version
- **Regular Scans**: Run security scans regularly
- **Verify Sources**: Only install packages from trusted sources
- **Monitor Dependencies**: Keep dependencies updated
- **Use Multiple Tools**: Don't rely on a single security tool
### For Contributors
- **Code Review**: All code changes require security review
- **Dependencies**: Minimize external dependencies
- **Testing**: Include security tests in pull requests
- **Documentation**: Document security-related changes
## Security Features
### Built-in Protections
- **Zero Dependencies**: No external packages to avoid supply chain attacks
- **Static Analysis**: No code execution during scanning
- **Transparent Logic**: All detection logic is open source
- **Regular Updates**: Updated with latest threat intelligence
### Detection Capabilities
- **Typosquatting**: Detects malicious package name variations
- **Suspicious Metadata**: Identifies unusual package information
- **Known Malware**: Flags known malicious packages
- **Vulnerabilities**: Integrates with npm audit
- **Deprecated Packages**: Identifies outdated dependencies
## Disclosure Policy
### Timeline
- **Critical**: 24-48 hours
- **High**: 1-2 weeks
- **Medium**: 2-4 weeks
- **Low**: 1-2 months
### Process
1. **Private Fix**: Develop and test fix privately
2. **Coordination**: Coordinate with reporter
3. **Release**: Release fix with security advisory
4. **Documentation**: Update security documentation
## Security Contacts
### Primary Contact
- **Name**: Felipe Segall Corrêa
- **Email**: contato@livresoltech.com
- **Company**: Livre Software Solutions
- **Website**: https://livresoltech.com
### Backup Contact
- **GitHub Security**: Use GitHub's security advisory feature
- **Response Time**: 24-48 hours
## Bug Bounty
Currently, we do not offer a formal bug bounty program. However, we greatly appreciate security researchers who responsibly disclose vulnerabilities and may offer recognition in our security hall of fame.
## Security Hall of Fame
We recognize security researchers who help improve our security:
- **2024**: [To be added as vulnerabilities are reported]
## Updates
This security policy is regularly reviewed and updated. Last updated: June 2024.
---
**Remember**: Security is everyone's responsibility. If you see something, say something!