Skip to content

Commit e99a650

Browse files
stackbilt-adminCodebeastclaude
authored
chore: add canonical SECURITY.md (#23)
Adds the standardized Stackbilt-dev security reporting template to this repository. The template is the canonical per-repo security file rolled out across the entire Stackbilt-dev organization as part of the outbound disclosure policy (Stackbilt-dev/docs#15). Key points: - Primary reporting channel: admin@stackbilt.dev - GitHub Security Advisory link scoped to this repo - Response target matrix (critical 24h ack / 7d fix, high 48h / 14d) - Full policy link at https://docs.stackbilt.dev/security/ - Explicit "do not open public GH issues for vulns" rule This replaces the implicit policy that existed via the Stackbilt-dev organization profile with an explicit per-repo file, so the GitHub security tab surfaces it and external researchers have a clear reporting path. Co-authored-by: Codebeast <codebeast@stackbilt.dev> Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1 parent e05658a commit e99a650

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed

SECURITY.md

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
# Security
2+
3+
For the full Stackbilt security policy, see https://docs.stackbilt.dev/security/.
4+
5+
## Reporting a Vulnerability
6+
7+
**Do not open a public GitHub issue for security vulnerabilities.**
8+
9+
### How to report
10+
11+
- **Primary channel:** email `admin@stackbilt.dev` with "SECURITY:" in the subject line
12+
- **GitHub Security Advisory:** https://github.com/Stackbilt-dev/cc-taskrunner/security/advisories/new
13+
- Include: vulnerability description, reproduction steps, potential impact, and any suggested mitigation
14+
15+
### Response targets
16+
17+
| Severity | Acknowledgement | Fix target |
18+
|---|---|---|
19+
| Critical — active exploitation, data exposure | 24 hours | 7 days |
20+
| High — exploitable with effort | 48 hours | 14 days |
21+
| Medium / Low | 5 business days | Next release cycle |
22+
23+
These are targets, not contractual SLAs. Stackbilt is a solo-founder operation and response times reflect that reality honestly. Critical issues affecting user data are prioritized above everything else.
24+
25+
### Scope
26+
27+
This policy covers all software published in this repository. For the full policy covering the entire Stackbilt-dev organization, see the [canonical security policy](https://docs.stackbilt.dev/security/).
28+
29+
### Out of scope
30+
31+
- Denial of service against free-tier services (Cloudflare handles DDoS)
32+
- Rate limiting bypass on non-authenticated endpoints (unless it enables data access)
33+
- Missing security headers on non-production deployments
34+
- Vulnerabilities in third-party dependencies where this repo is not the upstream maintainer
35+
36+
### Disclosure
37+
38+
- Stackbilt practices **coordinated disclosure** with a minimum 90-day window (30 days for critical).
39+
- Reporters are credited in release notes unless anonymity is requested.
40+
- Good-faith security research within this policy will not face legal action.
41+
42+
### Contact
43+
44+
- **Primary:** admin@stackbilt.dev
45+
- **Canonical policy:** https://docs.stackbilt.dev/security/

0 commit comments

Comments
 (0)