Skip to content

Security: hyperpolymath/reposystem

SECURITY.md

Security Policy

We take security seriously. We appreciate your efforts to responsibly disclose vulnerabilities and will make every effort to acknowledge your contributions. Table of Contents

Reporting a Vulnerability What to Include Response Timeline Disclosure Policy Scope Safe Harbour Recognition Security Updates Security Best Practices 

Reporting a Vulnerability Preferred Method: GitHub Security Advisories

The preferred method for reporting security vulnerabilities is through GitHub's Security Advisory feature:

Navigate to Report a Vulnerability Click "Report a vulnerability" Complete the form with as much detail as possible Submit — we'll receive a private notification 

This method ensures:

End-to-end encryption of your report Private discussion space for collaboration Coordinated disclosure tooling Automatic credit when the advisory is published 

Alternative: Encrypted Email

If you cannot use GitHub Security Advisories, you may email us directly:

Email security@hyperpolymath.org PGP Key Download Public Key Fingerprint See GPG key

Import our PGP key

curl -sSL https://hyperpolymath.org/gpg/security.asc | gpg --import

Verify fingerprint

gpg --fingerprint security@hyperpolymath.org

Encrypt your report

gpg --armor --encrypt --recipient security@hyperpolymath.org report.txt

⚠️ Important: Do not report security vulnerabilities through public GitHub issues, pull requests, discussions, or social media. 

What to Include

A good vulnerability report helps us understand and reproduce the issue quickly. Required Information

Description: Clear explanation of the vulnerability Impact: What an attacker could achieve (confidentiality, integrity, availability) Affected versions: Which versions/commits are affected Reproduction steps: Detailed steps to reproduce the issue 

Helpful Additional Information

Proof of concept: Code, scripts, or screenshots demonstrating the vulnerability Attack scenario: Realistic attack scenario showing exploitability CVSS score: Your assessment of severity (use CVSS 3.1 Calculator) CWE ID: Common Weakness Enumeration identifier if known Suggested fix: If you have ideas for remediation References: Links to related vulnerabilities, research, or advisories 

Example Report Structure

Summary

[One-sentence description of the vulnerability]

Vulnerability Type

[e.g., SQL Injection, XSS, SSRF, Path Traversal, etc.]

Affected Component

[File path, function name, API endpoint, etc.]

Affected Versions

[Version range or specific commits]

Severity Assessment

  • CVSS 3.1 Score: [X.X]
  • CVSS Vector: [CVSS:3.1/AV:X/AC:X/PR:X/UI:X/S:X/C:X/I:X/A:X]

Description

[Detailed technical description]

Steps to Reproduce

  1. [First step]
  2. [Second step]
  3. [...]

Proof of Concept

[Code, curl commands, screenshots, etc.]

Impact

[What can an attacker achieve?]

Suggested Remediation

[Optional: your ideas for fixing]

References

[Links to related issues, CVEs, research]

Response Timeline

We commit to the following response times: Stage Timeframe Description Initial Response 48 hours We acknowledge receipt and confirm we're investigating Triage 7 days We assess severity, confirm the vulnerability, and estimate timeline Status Update Every 7 days Regular updates on remediation progress Resolution 90 days Target for fix development and release (complex issues may take longer) Disclosure 90 days Public disclosure after fix is available (coordinated with you)

Note: These are targets, not guarantees. Complex vulnerabilities may require more time. We'll communicate openly about any delays. 

Disclosure Policy

We follow coordinated disclosure (also known as responsible disclosure):

You report the vulnerability privately We acknowledge and begin investigation We develop a fix and prepare a release We coordinate disclosure timing with you We publish security advisory and fix simultaneously You may publish your research after disclosure 

Our Commitments

We will not take legal action against researchers who follow this policy We will work with you to understand and resolve the issue We will credit you in the security advisory (unless you prefer anonymity) We will notify you before public disclosure We will publish advisories with sufficient detail for users to assess risk 

Your Commitments

Report vulnerabilities promptly after discovery Give us reasonable time to address the issue before disclosure Do not access, modify, or delete data beyond what's necessary to demonstrate the vulnerability Do not degrade service availability (no DoS testing on production) Do not share vulnerability details with others until coordinated disclosure 

Disclosure Timeline

Day 0 You report vulnerability Day 1-2 We acknowledge receipt Day 7 We confirm vulnerability and share initial assessment Day 7-90 We develop and test fix Day 90 Coordinated public disclosure (earlier if fix is ready; later by mutual agreement)

If we cannot reach agreement on disclosure timing, we default to 90 days from your initial report. Scope In Scope ✅

The following are within scope for security research:

This repository (hyperpolymath/terrapin-ssg) and all its code Official releases and packages published from this repository Documentation that could lead to security issues Build and deployment configurations in this repository Dependencies (report here, we'll coordinate with upstream) 

Out of Scope ❌

The following are not in scope:

Third-party services we integrate with (report directly to them) Social engineering attacks against maintainers Physical security Denial of service attacks against production infrastructure Spam, phishing, or other non-technical attacks Issues already reported or publicly known Theoretical vulnerabilities without proof of concept 

Qualifying Vulnerabilities

We're particularly interested in:

Remote code execution SQL injection, command injection, code injection Authentication/authorisation bypass Cross-site scripting (XSS) and cross-site request forgery (CSRF) Server-side request forgery (SSRF) Path traversal / local file inclusion Information disclosure (credentials, PII, secrets) Cryptographic weaknesses Deserialisation vulnerabilities Memory safety issues (buffer overflows, use-after-free, etc.) Supply chain vulnerabilities (dependency confusion, etc.) Significant logic flaws 

Non-Qualifying Issues

The following generally do not qualify as security vulnerabilities:

Missing security headers on non-sensitive pages Clickjacking on pages without sensitive actions Self-XSS (requires victim to paste code) Missing rate limiting (unless it enables a specific attack) Username/email enumeration (unless high-risk context) Missing cookie flags on non-sensitive cookies Software version disclosure Verbose error messages (unless exposing secrets) Best practice deviations without demonstrable impact 

Safe Harbour

We support security research conducted in good faith. Our Promise

If you conduct security research in accordance with this policy:

✅ We will not initiate legal action against you ✅ We will not report your activity to law enforcement ✅ We will work with you in good faith to resolve issues ✅ We consider your research authorised under the Computer Fraud and Abuse Act (CFAA), UK Computer Misuse Act, and similar laws ✅ We waive any potential claim against you for circumvention of security controls 

Good Faith Requirements

To qualify for safe harbour, you must:

Comply with this security policy Report vulnerabilities promptly Avoid privacy violations (do not access others' data) Avoid service degradation (no destructive testing) Not exploit vulnerabilities beyond proof-of-concept Not use vulnerabilities for profit (beyond bug bounties where offered) ⚠️ Important: This safe harbour does not extend to third-party systems. Always check their policies before testing. 

Recognition

We believe in recognising security researchers who help us improve. Hall of Fame

Researchers who report valid vulnerabilities will be acknowledged in our Security Acknowledgments (unless they prefer anonymity).

Recognition includes:

Your name (or chosen alias) Link to your website/profile (optional) Brief description of the vulnerability class Date of report 

What We Offer

✅ Public credit in security advisories ✅ Acknowledgment in release notes ✅ Entry in our Hall of Fame ✅ Reference/recommendation letter upon request (for significant findings) 

What We Don't Currently Offer

❌ Monetary bug bounties ❌ Hardware or swag ❌ Paid security research contracts Note: We're a community project with limited resources. Your contributions help everyone who uses this software. 

Security Updates Receiving Updates

To stay informed about security updates:

Watch this repository: Click "Watch" → "Custom" → Select "Security alerts" GitHub Security Advisories: Published at Security Advisories Release notes: Security fixes noted in CHANGELOG 

Update Policy Severity Response Critical/High Patch release as soon as fix is ready Medium Included in next scheduled release (or earlier) Low Included in next scheduled release Supported Versions Version Supported Notes main branch ✅ Yes Latest development Latest release ✅ Yes Current stable Previous minor release ✅ Yes Security fixes backported Older versions ❌ No Please upgrade Security Best Practices

When using terrapin-ssg, we recommend: General

Keep dependencies up to date Use the latest stable release Subscribe to security notifications Review configuration against security documentation Follow principle of least privilege 

For Contributors

Never commit secrets, credentials, or API keys Use signed commits (git config commit.gpgsign true) Review dependencies before adding them Run security linters locally before pushing Report any concerns about existing code 

Additional Resources

Our PGP Public Key Security Advisories Changelog Contributing Guidelines CVE Database CVSS Calculator 

Contact Purpose Contact Security issues Report via GitHub or security@hyperpolymath.org General questions GitHub Discussions Other enquiries See README for contact information Policy Changes

This security policy may be updated from time to time. Significant changes will be:

Committed to this repository with a clear commit message Noted in the changelog Announced via GitHub Discussions (for major changes) 

Thank you for helping keep terrapin-ssg and its users safe.

There aren’t any published security advisories