@@ -55,6 +55,39 @@ Here is the security disclosure policy for Node.js
55
55
possible; however, we must follow the release process above to ensure that we
56
56
handle disclosure consistently.
57
57
58
+ ## Code of Conduct and Vulnerability Reporting Guidelines
59
+
60
+ When reporting security vulnerabilities, reporters must adhere to the following guidelines:
61
+
62
+ 1 . ** Code of Conduct Compliance** : All security reports must comply with our
63
+ [ Code of Conduct] ( CODE_OF_CONDUCT.md ) . Reports that violate our code of conduct
64
+ will not be considered and may result in being banned from future participation.
65
+
66
+ 2 . ** No Harmful Actions** : Security research and vulnerability reporting must not:
67
+ * Cause damage to running systems or production environments.
68
+ * Disrupt Node.js development or infrastructure.
69
+ * Affect other users' applications or systems.
70
+ * Include actual exploits that could harm users.
71
+ * Involve social engineering or phishing attempts.
72
+
73
+ 3 . ** Responsible Testing** : When testing potential vulnerabilities:
74
+ * Use isolated, controlled environments.
75
+ * Do not test on production systems.
76
+ * Do not attempt to access or modify other users' data.
77
+ * Immediately stop testing if unauthorized access is gained accidentally.
78
+
79
+ 4 . ** Report Quality**
80
+ * Provide clear, detailed steps to reproduce the vulnerability.
81
+ * Include only the minimum proof of concept required to demonstrate the issue.
82
+ * Remove any malicious payloads or components that could cause harm.
83
+
84
+ Failure to follow these guidelines may result in:
85
+
86
+ * Rejection of the vulnerability report.
87
+ * Forfeiture of any potential bug bounty.
88
+ * Temporary or permanent ban from the bug bounty program.
89
+ * Legal action in cases of malicious intent.
90
+
58
91
## The Node.js threat model
59
92
60
93
In the Node.js threat model, there are trusted elements such as the
0 commit comments