mirror of
https://github.com/GyulyVGC/sniffnet.git
synced 2026-04-18 05:08:10 -04:00
1.8 KiB
1.8 KiB
Incident Response Plan
This document describes how Sniffnet handles security incidents.
For how to report a vulnerability, see SECURITY.md.
Scope
An incident is anything that compromises, or could compromise, the integrity or safety of Sniffnet or its users:
- a vulnerability in Sniffnet or one of its dependencies
- a tampered release artifact or compromised signing key
- unauthorized commits, tags, or releases
- a compromised maintainer account or the sniffnet.net website
Roles
- Incident Lead: the project maintainer (@GyulyVGC). Owns the response and all external communication.
- Reporter: credited in the final advisory unless they prefer otherwise.
- Trusted contributors: may be invited into the private advisory to help fix or review.
Process
- Triage. Open a private GitHub Security Advisory to track the issue. Confirm it reproduces and assess impact.
- Contain. If needed, withdraw affected releases, revoke exposed secrets or keys, or revert unauthorized changes.
- Fix. Develop and review the patch privately. Add a regression test where possible. Rotate anything that might have been exposed.
- Release. Ship a patched version through the usual channels.
- Disclose. Publish the advisory (request a CVE if applicable) and note
the fix in
CHANGELOG.md. - Review. Write a short post-mortem and file follow-up issues for any gaps it exposes.
Nothing about an unfixed issue is discussed in public issues, PRs, or commit messages until disclosure.