Skip to content

Commit 8cb3441

Browse files
RafaelGSSaduh95
authored andcommitted
doc: explicit mention arbitrary code execution as a vuln
This request came from Github Open Source Secure and it's always welcome to clarify the policy PR-URL: #57426 Reviewed-By: Marco Ippolito <marcoippolito54@gmail.com> Reviewed-By: Chengzhong Wu <legendecas@gmail.com> Reviewed-By: Matteo Collina <matteo.collina@gmail.com>
1 parent 4ab3c16 commit 8cb3441

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

SECURITY.md

+3
Original file line numberDiff line numberDiff line change
@@ -106,6 +106,9 @@ a security vulnerability. Examples of unwanted actions are polluting globals,
106106
causing an unrecoverable crash, or any other unexpected side effects that can
107107
lead to a loss of confidentiality, integrity, or availability.
108108

109+
For example, if trusted input (like secure application code) is correct,
110+
then untrusted input must not lead to arbitrary JavaScript code execution.
111+
109112
**Node.js trusts everything else**. Examples include:
110113

111114
* The developers and infrastructure that runs it.

0 commit comments

Comments
 (0)