docs/security/policy-template.md
The [PROJECT_NAME] team takes security seriously. We appreciate responsible disclosure of vulnerabilities and are committed to working with security researchers to keep our project secure.
This document outlines our security policy, incident response procedures, and how to report vulnerabilities.
This security policy applies to vulnerabilities discovered within the [REPOSITORY_NAME] repository. The scope includes:
The following are considered out of scope for this policy:
We provide security updates for the following versions:
| Version | Supported |
|---|---|
| [X.Y.Z] | :white_check_mark: |
| [X.Y-1] | :x: |
[SECURITY_EMAIL]⚠️ DO NOT report security vulnerabilities through public GitHub issues.
Report to: [SECURITY_EMAIL]
| Level | Description | Examples |
|---|---|---|
| Critical (P0) | Immediate threat to all users | Remote code execution, authentication bypass, data breach |
| High (P1) | Significant security impact | Privilege escalation, data exposure, XSS in auth flows |
| Medium (P2) | Limited security impact | XSS in non-critical areas, CSRF vulnerabilities |
| Low (P3) | Minor security issues | Information disclosure, security misconfigurations |
| Severity | Initial Response | Fix Target | Disclosure |
|---|---|---|---|
| Critical | 2 days | 14 days | Upon patch |
| High | 3 days | 30 days | Upon patch |
| Medium | 5 days | 60 days | Upon patch |
| Low | 7 days | Best effort | With release |
We consider security research conducted in good faith to be:
Requirements for safe harbor:
We value security researchers' contributions:
Secret Management
Authentication & Authorization
Dependencies
Deployment
Code Security
Template Instructions: Replace all [BRACKETS] with project-specific information and adjust timelines to match your team's capacity.
Thank you for helping us keep [PROJECT_NAME] secure!