You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: SECURITY.md
+25-3Lines changed: 25 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,29 @@ The [latest released version](https://github.com/jquery/jquery/releases) of jQue
6
6
7
7
## Reporting a Vulnerability
8
8
9
-
Please emailsecurity@jquery.com, and we will respond as quickly as possible.
9
+
Please report security issues **privately**:
10
10
11
-
If the vulnerability is considered valid and accepted, a patch will be made for the latest jQuery version.
12
-
If the vulnerability is deemed invalid, no further action is required.
11
+
- Email: security@jquery.com
12
+
13
+
**Do not** file public GitHub issues for security problems.
14
+
15
+
When reporting, please include:
16
+
- Affected project/repo and version(s)
17
+
- Impact and component(s) involved
18
+
- Reproduction steps or PoC (if available)
19
+
- Your contact and preferred credit name
20
+
21
+
If you do not receive an acknowledgement of your report within **6 business days**, or if you cannot find a private security contact for the project, you may **escalate to the OpenJS Foundation CNA** at `security@lists.openjsf.org`.
22
+
23
+
If the project acknowledges your report but does not provide any further response or engagement within **14 days**, escalation is also appropriate.
24
+
25
+
## Coordination & Disclosure
26
+
27
+
Important:
28
+
- If the vulnerability is considered valid and accepted, a patch will be made for the latest jQuery version.
29
+
- If the vulnerability is deemed invalid, no further action is required.
30
+
31
+
We follow coordinated vulnerability disclosure:
32
+
- We will acknowledge your report, assess impact, and work on a fix.
33
+
- We aim to provide status updates at reasonable intervals until resolution.
34
+
- We will publish a security advisory (and **CVE via the OpenJS CNA when applicable**) once a fix or mitigation is available. We credit reporters by default unless you request otherwise.
0 commit comments