Vulnerability Disclosure
Disclosure of a vulnerability in an open-source package
Seal Security values the security community and believes that responsible disclosure of security vulnerabilities in open source packages is crucial for ensuring the overall security of the open source ecosystem. We aim to provide a disclosure program for the security community to report security issues found within managed open source code.
The Seal Security responsible disclosure program strives to protect both the maintainer and the reporting researcher. It allows maintainers and developers who use open source code to safely benefit from the discovery of these vulnerabilities before public disclosure, while also crediting researchers for their dedication.
Vulnerability disclosure reporting process
Submission: Researchers and developers are invited to submit detailed reports outlining identified vulnerabilities in open source code.
Validation: The Seal Security security team meticulously evaluates each report, assessing the validity of the claims and the severity of the associated risks.
Maintainer Notification: Upon validation, Seal Security promptly contacts the owner or maintainer of the affected project through various channels.
Collaboration & Disclosure Timeline: Seal Security collaborates with the maintainer by providing vulnerability details, suggesting potential fixes, and establishing a mutually agreeable timeframe for public disclosure.
Public Disclosure: Once a fix is available, Seal Security publicly discloses the vulnerability, acknowledging the researcher's contribution.
CVE Assignment: As a recognized CVE Central Naming Authority (CNA), Seal Security assigns a unique CVE identifier to the disclosed vulnerability.
Reporting vulnerabilities
Vulnerability reports can be submitted directly to disclosure@sealsecurity.io
. The report must contain the following details:
Affected package
Relevant package manager
Vulnerability details
Steps to reproduce
Upon receiving the report, Seal Security validates and documents the reported vulnerability prior to contacting the maintainer.
Vulnerability disclosures sent by email can also be encrypted using the following PGP key:
Vulnerability validation
After validating a submitted vulnerability report, a security analyst will reach out to the submitter using the provided contact details. This communication acknowledges receipt of the report, discusses the vulnerability details, and confirms the assigned severity level.
Working with the maintainers
Upon successful validation of the vulnerability report, Seal Security promptly contacts the affected package's maintainer. We'll share detailed vulnerability information to facilitate their internal resolution process.
Coordination:
Maintainers should acknowledge receipt of the vulnerability report, and provide a point of contact for further coordination, and their expected remediation timeline.
Seal Security will then provide any additional information that will assist the maintainers in the development of a security fix.
The maintainers and Seal Security will then collaborate on the public disclosure timeline.
Responsible disclosure timeline:
Seal Security adheres to a 90-day responsible disclosure timeframe. This allows the maintainer ample time to develop and release a fix before the vulnerability is publicly disclosed. Extensions can be granted upon request, especially for critical vulnerabilities, to ensure a patch is readily available before public disclosure.
Following up (Day 30):
If we haven't received an acknowledgement or response from the maintainer within 30 days, we resend the vulnerability details to the initial point of contact.
Additionally, we attempt to reach out to a secondary contact listed publicly if available.
Escalation and disclosure consideration (day 45):
If there's no response after another 15 days (total of 45 days), we may escalate the communication.
This escalation could involve re-sending the details to all previous contacts and potentially notifying relevant stakeholders or customers at our discretion.
Public disclosure (after day 60):
If there's no response after another 15 days (total of 60 days), or if the maintainer expresses no desire to collaborate on disclosure, we may issue a public security advisory.
Public disclosure
Seal Security will assign the vulnerability a CVE ID, and share information about the vulnerability and the related fix on its website.
Public disclosure may be initiated either by failure to respond in a timely manner in accordance with the responsible disclosure timeline, or in coordination with the package maintainers.
After the public disclosure, Seal Security may share information about the vulnerability and the fix to the public through any medium it deems appropriate.
Last updated