|
1 | 1 | # Security Policy |
2 | 2 |
|
3 | | -## Supported Version |
| 3 | +## Supported Versions |
4 | 4 |
|
5 | 5 | > | **Legend** | **Description** | |
6 | 6 | > |:-:|:--| |
7 | 7 | > | L | **LTS:** Long term supported. | |
8 | 8 | > | ✔ | **Active / Current:** Currently supported. | |
9 | | -> | 👎{🐛} | **Partly (Issue):** Partly supported due to confirmed contains bugs and/or issues. | |
10 | | -> | 👎{🧓} | **Partly (Old):** Partly supported due to deprecated by newer versions. | |
| 9 | +> | 👎{🐛} | **Partially (Issue):** Partially supported due to confirmed contains bugs and/or issues. | |
| 10 | +> | 👎{🧓} | **Partially (Old):** Partially supported due to deprecated by newer versions. | |
11 | 11 | > | ❌{🐛} | **No (Issue):** Not supported due to confirmed contains bugs and/or issues. | |
12 | 12 | > | ❌{🧓} | **No (Old):** Not supported due to too old. | |
13 | 13 |
|
14 | | -| **Tag / Version** | **Target** | **Support** | |
15 | | -|:-:|:-:|:-:| |
16 | | -| v0.5.X | PowerShell v7.2.0 | ✔ | |
17 | | -| v0.5.0 \~ v0.5.3 | PowerShell v7.2.0 | 👎{🐛} | |
18 | | -| v0.4.X | PowerShell v7.2.0 | 👎{🧓} | |
19 | | -| v0.3.X | PowerShell v7.2.0 | 👎{🧓} | |
20 | | -| v0.3.0 \~ v0.3.2 | PowerShell v7.2.0 | ❌{🐛🧓} | |
21 | | -| v0.2.X | PowerShell v7.2.0 | ❌{🧓} | |
22 | | -| < v0.2.X | PowerShell v7.2.0 | ❌{🐛🧓} | |
| 14 | +| **Versions** | **Status** | **Target - PowerShell** | **Target - NodeJS (Wrapper API)** | **Target - NPM (Wrapper API)** | |
| 15 | +|:-:|:-:|:-:|:-:|:-:| |
| 16 | +| v0.5.X | ✔ | >= v7.2.0 | >= 14.15.0 | >= v6.14.8 | |
| 17 | +| v0.5.0 \~ v0.5.3 | 👎{🐛} | >= v7.2.0 | >= 14.15.0 | >= v6.14.8 | |
| 18 | +| v0.4.X | 👎{🧓} | >= v7.2.0 | *N/A* | *N/A* | |
| 19 | +| v0.3.X | 👎{🧓} | >= v7.2.0 | *N/A* | *N/A* | |
| 20 | +| v0.3.0 \~ v0.3.2 | ❌{🐛🧓} | >= v7.2.0 | *N/A* | *N/A* | |
| 21 | +| v0.2.X | ❌{🧓} | >= v7.2.0 | *N/A* | *N/A* | |
| 22 | +| < v0.2.X | ❌{🐛🧓} | >= v7.2.0 | *N/A* | *N/A* | |
23 | 23 |
|
24 | 24 | ## Report Vulnerability |
25 | 25 |
|
26 | | -### Contact |
| 26 | +If you believe you have found any security vulnerability, please do not report it publicly! Instead, please report it via [fill this form](https://forms.gle/iYjv8jGqkBzjy9yW9) or send an e-mail. |
27 | 27 |
|
28 | | -Send an email to anyone who listed in here (click the link to obtain the email address): |
| 28 | +All new reports may need up to `~48 hours (~2 days)` to begin the process. |
| 29 | + |
| 30 | +> **⚠ Important:** |
| 31 | +> |
| 32 | +> All reports will only proceed to further process while: |
| 33 | +> |
| 34 | +> - with the correct personal information of the reporter, and |
| 35 | +> - with the correct project's ID or repository URI. |
| 36 | +> |
| 37 | +> Otherwise the report will mark as invalid immediately, not proceed, and without any notification. |
| 38 | +
|
| 39 | +### Via Send An E-mail |
| 40 | + |
| 41 | +Send an e-mail to either one who listed in here (e-mail address is listed in the profile): |
29 | 42 |
|
30 | 43 | - [hugoalh](https://github.com/hugoalh) |
31 | 44 |
|
32 | | -### Suggested Content List |
| 45 | +#### Suggested Content List |
| 46 | + |
| 47 | +Please provide as much as you can to help the security vulnerability report supervisors for better understand the nature, scope of the possible issues, and triage your report more quickly. |
33 | 48 |
|
34 | | -- Your GitHub account username (e.g.: `@octocat`) |
35 | | -- Project identification name |
36 | | -- Affected versions (versions must be listed as supported) |
37 | | -- Affected files |
38 | | -- Issues to cause this security issue |
39 | | -- Common Vulnerabilities and Exposures (CVE) identification numbers |
40 | | -- References of this security issue |
| 49 | +- Your account's platform (e.g.: GitHub, GitLab, ...). |
| 50 | +- Your account's username (e.g.: `@octocat`). |
| 51 | +- Project's ID or repository URI. |
| 52 | + - Project's ID is displayed at the top part of readme (i.e.: `README` file), below the project display name (i.e.: header), inside a code block. |
| 53 | +- Affected branches, commits, tags, and/or versions. |
| 54 | + - Versions must be listed as supported. |
| 55 | + - For multiple versions, you can use version range instead. |
| 56 | +- Affected files. |
| 57 | + - Files which related to the manifestation of this security vulnerability. |
| 58 | + - Relative files' paths based on repository root. |
| 59 | +- Issues to cause this security vulnerability (e.g.: buffer overflow, cross-site scripting, SQL injection, ...). |
| 60 | +- Any special/specific configuration required to reproduce this security vulnerability? |
| 61 | +- Steps' instructions to reproduce this security vulnerability. |
| 62 | +- Proof of concept and/or exploit code. |
| 63 | + - How an attacker might exploit this security vulnerability? |
| 64 | +- References of this security vulnerability. |
| 65 | + - Common Vulnerabilities and Exposures (CVE) IDs. |
| 66 | + - Common Weakness Enumerator (CWE) IDs. |
0 commit comments