|
2 | 2 |
|
3 | 3 | ## Supported Versions |
4 | 4 |
|
5 | | -Use this section to tell people about which versions of your project are |
6 | | -currently being supported with security updates. |
| 5 | +The following versions of roslyn-diff are currently supported with security updates: |
7 | 6 |
|
8 | 7 | | Version | Supported | |
9 | 8 | | ------- | ------------------ | |
10 | | -| 5.1.x | :white_check_mark: | |
11 | | -| 5.0.x | :x: | |
12 | | -| 4.0.x | :white_check_mark: | |
13 | | -| < 4.0 | :x: | |
| 9 | +| 0.5.x | :white_check_mark: | |
| 10 | +| < 0.5 | :x: | |
14 | 11 |
|
15 | 12 | ## Reporting a Vulnerability |
16 | 13 |
|
17 | | -Use this section to tell people how to report a vulnerability. |
| 14 | +If you discover a security vulnerability in roslyn-diff, please report it responsibly: |
18 | 15 |
|
19 | | -Tell them where to go, how often they can expect to get an update on a |
20 | | -reported vulnerability, what to expect if the vulnerability is accepted or |
21 | | -declined, etc. |
| 16 | +1. **Do not** open a public GitHub issue for security vulnerabilities. |
| 17 | + |
| 18 | +2. **Email** the maintainers directly or use GitHub's private vulnerability reporting feature. |
| 19 | + |
| 20 | +3. **Include** the following information in your report: |
| 21 | + - Description of the vulnerability |
| 22 | + - Steps to reproduce the issue |
| 23 | + - Potential impact |
| 24 | + - Any suggested fixes (optional) |
| 25 | + |
| 26 | +4. **Response timeline**: |
| 27 | + - Initial acknowledgment: within 48 hours |
| 28 | + - Status update: within 7 days |
| 29 | + - Resolution target: within 30 days for critical issues |
| 30 | + |
| 31 | +## Security Considerations |
| 32 | + |
| 33 | +roslyn-diff is a code comparison tool that: |
| 34 | + |
| 35 | +- Reads and parses source code files locally |
| 36 | +- Does not transmit data over the network |
| 37 | +- Does not execute the code it analyzes |
| 38 | +- Generates HTML reports that may be opened in a browser |
| 39 | + |
| 40 | +### HTML Report Security |
| 41 | + |
| 42 | +When generating HTML reports: |
| 43 | +- All user-provided file paths are HTML-encoded to prevent XSS |
| 44 | +- JavaScript in reports is sandboxed to clipboard and UI operations only |
| 45 | +- Reports use `encodeURIComponent()` for URL parameters |
| 46 | + |
| 47 | +## Scope |
| 48 | + |
| 49 | +This security policy applies to: |
| 50 | +- The roslyn-diff CLI tool |
| 51 | +- The RoslynDiff.Core library |
| 52 | +- The RoslynDiff.Output library |
| 53 | +- Generated HTML/JSON output formats |
| 54 | + |
| 55 | +Third-party dependencies are managed via NuGet and should be kept updated. |
0 commit comments