|
1 | | -MIT License |
2 | | - |
3 | | -Copyright (c) 2022 Contentstack |
4 | | - |
5 | | -Permission is hereby granted, free of charge, to any person obtaining a copy |
6 | | -of this software and associated documentation files (the "Software"), to deal |
7 | | -in the Software without restriction, including without limitation the rights |
8 | | -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell |
9 | | -copies of the Software, and to permit persons to whom the Software is |
10 | | -furnished to do so, subject to the following conditions: |
11 | | - |
12 | | -The above copyright notice and this permission notice shall be included in all |
13 | | -copies or substantial portions of the Software. |
14 | | - |
15 | | -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
16 | | -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
17 | | -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE |
18 | | -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
19 | | -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, |
20 | | -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE |
21 | | -SOFTWARE. |
| 1 | +## Security |
| 2 | + |
| 3 | +Contentstack takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations. |
| 4 | + |
| 5 | +If you believe you have found a security vulnerability in any Contentstack-owned repository, please report it to us as described below. |
| 6 | + |
| 7 | +## Reporting Security Issues |
| 8 | + |
| 9 | +**Please do not report security vulnerabilities through public GitHub issues.** |
| 10 | + |
| 11 | +Send email to [security@contentstack.com](mailto:security@contentstack.com). |
| 12 | + |
| 13 | +You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. |
| 14 | + |
| 15 | +Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue: |
| 16 | + |
| 17 | + * Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.) |
| 18 | + * Full paths of source file(s) related to the manifestation of the issue |
| 19 | + * The location of the affected source code (tag/branch/commit or direct URL) |
| 20 | + * Any special configuration required to reproduce the issue |
| 21 | + * Step-by-step instructions to reproduce the issue |
| 22 | + * Proof-of-concept or exploit code (if possible) |
| 23 | + * Impact of the issue, including how an attacker might exploit the issue |
| 24 | + |
| 25 | +This information will help us triage your report more quickly. |
| 26 | + |
| 27 | +[https://www.contentstack.com/trust/](https://www.contentstack.com/trust/) |
0 commit comments