This document outlines the security team structure and responsibilities for the Throttle project.
| Role | Name | GitHub | Responsibilities | |
|---|---|---|---|---|
| Security Lead | Sambhrant Maurya | @sdeonvacation | maurya.sam@hotmail.com | Overall security strategy, vulnerability coordination, security policy |
| Developer | [Contributors welcome] | - | - | Code security reviews, security testing |
The security team is responsible for:
-
Vulnerability Management
- Monitoring and responding to security reports
- Coordinating disclosure and patches for security vulnerabilities
- Maintaining the security advisory process
-
Security Reviews
- Reviewing pull requests for security implications
- Conducting periodic security audits of the codebase
- Ensuring security best practices are followed
-
Security Tooling
- Maintaining security scanning tools (CodeQL, FindSecBugs, OWASP Dependency Check)
- Reviewing and acting on security scan results
- Keeping security tools and configurations up to date
-
Security Documentation
- Maintaining SECURITY.md policy
- Documenting security architecture and threat models
- Providing security guidance for contributors
-
Incident Response
- Responding to security incidents
- Coordinating with stakeholders during security events
- Post-incident analysis and improvements
Contributors interested in joining the security team should:
- Have a proven track record of contributions to the project
- Demonstrate knowledge of security best practices
- Contact the Security Lead via email or GitHub
- Frequency: As needed, minimum quarterly
- Format: Virtual meetings via GitHub Discussions or email
- Topics: Vulnerability reviews, security roadmap, tool updates
For security-related questions or to report vulnerabilities, see SECURITY.md.
For security team coordination and non-urgent security matters, contact:
- Primary: maurya.sam@hotmail.com
- GitHub Issues: Use the
securitylabel for public security discussions (non-vulnerabilities only)
The security team operates under the following principles:
- Transparency: Security processes and decisions are documented and open
- Responsiveness: Security reports receive timely acknowledgment and resolution
- Continuous Improvement: Regular review and enhancement of security practices
- Community Collaboration: Working with the broader security community
Last updated: 2026-03-18