This project uses go 1.20
Use this section to tell people about which versions of your project are currently being supported with security updates.
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
Gather Information: Collect details about the vulnerability, including its nature, potential impact, and steps to reproduce it.
Identify the Responsible Party: Determine who is responsible for the software, system, or website that has the vulnerability. This could be the developer, maintainer, or organization.
Check for a Disclosure Policy: Look for a "Security" or "Responsible Disclosure" page on the website of the responsible party. Some organizations provide guidelines for reporting vulnerabilities.
Prepare Your Report: Craft a well-structured report that includes the vulnerability description, impact assessment, and steps to replicate it. Include any relevant files or screenshots.
Contact the Responsible Party: If there's a disclosure policy, follow the recommended method to report the vulnerability. This might involve sending an email to a designated security contact or using a specific reporting platform.
Provide Relevant Details: Make sure to provide all necessary details in your report, making it easy for the responsible party to understand and verify the vulnerability.
Set a Reasonable Deadline: Give the responsible party a reasonable amount of time (typically 30-90 days) to acknowledge and address the vulnerability.
Be Patient and Responsive: Allow the responsible party time to assess and fix the vulnerability. Be prepared to provide additional information if requested.
Coordinate the Fix: If the vulnerability is confirmed, work with the responsible party to understand the fix and verify that it resolves the issue.
Acknowledge and Thank: If the responsible party fixes the vulnerability, acknowledge their efforts and thank them for addressing the issue.