You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Express team and community take all security bugs in Express seriously.
312
-
Thank you for improving the security of Express. We appreciate your efforts and
313
-
responsible disclosure and will make every effort to acknowledge your
314
-
contributions.
312
+
> [!IMPORTANT]
313
+
> Before reporting a vulnerability, please review the [Express Threat Model](#the-express-threat-model) to check if the issue falls within Express's security scope.
315
314
316
-
Report security bugs by emailing `express-security@lists.openjsf.org`.
315
+
The Express team and community take all security vulnerabilities seriously.
316
+
Thank you for improving the security of Express and related projects.
317
+
We appreciate your efforts in responsible disclosure and will make every effort
318
+
to acknowledge your contributions.
317
319
318
-
To ensure the timely response to your report, please ensure that the entirety
319
-
of the report is contained within the email body and not solely behind a web
320
-
link or an attachment.
320
+
A [Security triage team member](https://github.com/expressjs/security-wg#security-triage-team-expressjssecurity-triage)
321
+
or [the repo captain](https://github.com/expressjs/discussions/blob/master/docs/contributing/captains_and_committers.md)
322
+
will acknowledge your report as soon as possible.
323
+
These timelines may extend when our triage
324
+
volunteers are away on holiday, particularly at the end of the year.
321
325
322
-
The lead maintainer will acknowledge your email within 48 hours, and will send a
323
-
more detailed response within 48 hours indicating the next steps in handling
324
-
your report. After the initial reply to your report, the security team will
326
+
After the initial reply to your report, the security team will
325
327
endeavor to keep you informed of the progress towards a fix and full
326
328
announcement, and may ask for additional information or guidance.
327
329
328
-
Report security bugs in third-party modules to the person or team maintaining
329
-
the module.
330
+
> [!NOTE]
331
+
> You can find more information about our process in [this guide](https://github.com/expressjs/security-wg/blob/main/docs/incident_response_plan.md)
330
332
331
-
###Pre-release Versions
333
+
#### Reporting Security Bugs via GitHub Security Advisory (Preferred)
332
334
333
-
Alpha and Beta releases are unstable and **not suitable for production use**.
334
-
Vulnerabilities found in pre-releases should be reported according to the [Reporting a Bug](#reporting-a-bug) section.
335
-
Due to the unstable nature of the branch it is not guaranteed that any fixes will be released in the next pre-release.
335
+
The preferred way to report security vulnerabilities is through
1. Visit the **Security** tab of the affected repository on GitHub.
344
+
2. Click **Report a vulnerability** and follow the provided steps.
345
+
346
+
This process applies to any repositories within the Express ecosystem.
347
+
If you are unsure whether a repository falls under this policy,
348
+
feel free to reach out via email.
349
+
350
+
#### Reporting via Email
351
+
352
+
If you prefer, you can also report security issues by emailing `express-security@lists.openjsf.org`.
353
+
354
+
To ensure a timely response, please include all relevant details directly in the email body rather than linking to external sources or attaching files.
355
+
356
+
The lead maintainer will acknowledge your email within 48 hours and provide an initial response outlining the next steps. The security team will keep you updated on the progress and may request additional details.
357
+
358
+
#### Third-Party Modules
359
+
360
+
If the security issue pertains to a third-party module that is not directly maintained within the Express ecosystem, please report it to the maintainers of that module.
336
361
337
362
### Disclosure Policy
338
363
@@ -345,15 +370,19 @@ involving the following steps:
345
370
- Prepare fixes for all releases still under maintenance. These fixes will be
346
371
released as fast as possible to npm.
347
372
348
-
### The Express Threat Model
349
-
350
-
We are currently working on a new version of the security model, the most updated version can be found [here](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md)
351
-
352
373
### Comments on this Policy
353
374
354
375
If you have suggestions on how this process could be improved please submit a
355
376
pull request.
356
377
378
+
### The Express Threat Model
379
+
380
+
The Express threat model defines the boundaries of what the framework considers its security responsibility. It establishes which elements are trusted (such as the developer, the runtime environment, and application code) versus untrusted (such as data from network connections). Issues arising from trusted elements are considered out of scope, while Express is responsible for safely handling untrusted data.
381
+
382
+
Many commonly reported concerns fall outside Express's security scope and are the responsibility of the application developer. Such as prototype pollution from unsanitized user input, misconfigured static file serving, or issues in third-party dependencies.
383
+
384
+
For complete details, see the [Express Threat Model](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md).
385
+
357
386
----
358
387
359
388
# Contributing to Expressjs.com {#expressjs-website-contributing}
The Express team and community take all security bugs in Express seriously.
312
-
Thank you for improving the security of Express. We appreciate your efforts and
313
-
responsible disclosure and will make every effort to acknowledge your
314
-
contributions.
312
+
> [!IMPORTANT]
313
+
> Before reporting a vulnerability, please review the [Express Threat Model](#the-express-threat-model) to check if the issue falls within Express's security scope.
315
314
316
-
Report security bugs by emailing `express-security@lists.openjsf.org`.
315
+
The Express team and community take all security vulnerabilities seriously.
316
+
Thank you for improving the security of Express and related projects.
317
+
We appreciate your efforts in responsible disclosure and will make every effort
318
+
to acknowledge your contributions.
317
319
318
-
To ensure the timely response to your report, please ensure that the entirety
319
-
of the report is contained within the email body and not solely behind a web
320
-
link or an attachment.
320
+
A [Security triage team member](https://github.com/expressjs/security-wg#security-triage-team-expressjssecurity-triage)
321
+
or [the repo captain](https://github.com/expressjs/discussions/blob/master/docs/contributing/captains_and_committers.md)
322
+
will acknowledge your report as soon as possible.
323
+
These timelines may extend when our triage
324
+
volunteers are away on holiday, particularly at the end of the year.
321
325
322
-
The lead maintainer will acknowledge your email within 48 hours, and will send a
323
-
more detailed response within 48 hours indicating the next steps in handling
324
-
your report. After the initial reply to your report, the security team will
326
+
After the initial reply to your report, the security team will
325
327
endeavor to keep you informed of the progress towards a fix and full
326
328
announcement, and may ask for additional information or guidance.
327
329
328
-
Report security bugs in third-party modules to the person or team maintaining
329
-
the module.
330
+
> [!NOTE]
331
+
> You can find more information about our process in [this guide](https://github.com/expressjs/security-wg/blob/main/docs/incident_response_plan.md)
330
332
331
-
###Pre-release Versions
333
+
#### Reporting Security Bugs via GitHub Security Advisory (Preferred)
332
334
333
-
Alpha and Beta releases are unstable and **not suitable for production use**.
334
-
Vulnerabilities found in pre-releases should be reported according to the [Reporting a Bug](#reporting-a-bug) section.
335
-
Due to the unstable nature of the branch it is not guaranteed that any fixes will be released in the next pre-release.
335
+
The preferred way to report security vulnerabilities is through
1. Visit the **Security** tab of the affected repository on GitHub.
344
+
2. Click **Report a vulnerability** and follow the provided steps.
345
+
346
+
This process applies to any repositories within the Express ecosystem.
347
+
If you are unsure whether a repository falls under this policy,
348
+
feel free to reach out via email.
349
+
350
+
#### Reporting via Email
351
+
352
+
If you prefer, you can also report security issues by emailing `express-security@lists.openjsf.org`.
353
+
354
+
To ensure a timely response, please include all relevant details directly in the email body rather than linking to external sources or attaching files.
355
+
356
+
The lead maintainer will acknowledge your email within 48 hours and provide an initial response outlining the next steps. The security team will keep you updated on the progress and may request additional details.
357
+
358
+
#### Third-Party Modules
359
+
360
+
If the security issue pertains to a third-party module that is not directly maintained within the Express ecosystem, please report it to the maintainers of that module.
336
361
337
362
### Disclosure Policy
338
363
@@ -345,15 +370,19 @@ involving the following steps:
345
370
- Prepare fixes for all releases still under maintenance. These fixes will be
346
371
released as fast as possible to npm.
347
372
348
-
### The Express Threat Model
349
-
350
-
We are currently working on a new version of the security model, the most updated version can be found [here](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md)
351
-
352
373
### Comments on this Policy
353
374
354
375
If you have suggestions on how this process could be improved please submit a
355
376
pull request.
356
377
378
+
### The Express Threat Model
379
+
380
+
The Express threat model defines the boundaries of what the framework considers its security responsibility. It establishes which elements are trusted (such as the developer, the runtime environment, and application code) versus untrusted (such as data from network connections). Issues arising from trusted elements are considered out of scope, while Express is responsible for safely handling untrusted data.
381
+
382
+
Many commonly reported concerns fall outside Express's security scope and are the responsibility of the application developer. Such as prototype pollution from unsanitized user input, misconfigured static file serving, or issues in third-party dependencies.
383
+
384
+
For complete details, see the [Express Threat Model](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md).
385
+
357
386
----
358
387
359
388
# Contributing to Expressjs.com {#expressjs-website-contributing}
The Express team and community take all security bugs in Express seriously.
312
-
Thank you for improving the security of Express. We appreciate your efforts and
313
-
responsible disclosure and will make every effort to acknowledge your
314
-
contributions.
312
+
> [!IMPORTANT]
313
+
> Before reporting a vulnerability, please review the [Express Threat Model](#the-express-threat-model) to check if the issue falls within Express's security scope.
315
314
316
-
Report security bugs by emailing `express-security@lists.openjsf.org`.
315
+
The Express team and community take all security vulnerabilities seriously.
316
+
Thank you for improving the security of Express and related projects.
317
+
We appreciate your efforts in responsible disclosure and will make every effort
318
+
to acknowledge your contributions.
317
319
318
-
To ensure the timely response to your report, please ensure that the entirety
319
-
of the report is contained within the email body and not solely behind a web
320
-
link or an attachment.
320
+
A [Security triage team member](https://github.com/expressjs/security-wg#security-triage-team-expressjssecurity-triage)
321
+
or [the repo captain](https://github.com/expressjs/discussions/blob/master/docs/contributing/captains_and_committers.md)
322
+
will acknowledge your report as soon as possible.
323
+
These timelines may extend when our triage
324
+
volunteers are away on holiday, particularly at the end of the year.
321
325
322
-
The lead maintainer will acknowledge your email within 48 hours, and will send a
323
-
more detailed response within 48 hours indicating the next steps in handling
324
-
your report. After the initial reply to your report, the security team will
326
+
After the initial reply to your report, the security team will
325
327
endeavor to keep you informed of the progress towards a fix and full
326
328
announcement, and may ask for additional information or guidance.
327
329
328
-
Report security bugs in third-party modules to the person or team maintaining
329
-
the module.
330
+
> [!NOTE]
331
+
> You can find more information about our process in [this guide](https://github.com/expressjs/security-wg/blob/main/docs/incident_response_plan.md)
330
332
331
-
###Pre-release Versions
333
+
#### Reporting Security Bugs via GitHub Security Advisory (Preferred)
332
334
333
-
Alpha and Beta releases are unstable and **not suitable for production use**.
334
-
Vulnerabilities found in pre-releases should be reported according to the [Reporting a Bug](#reporting-a-bug) section.
335
-
Due to the unstable nature of the branch it is not guaranteed that any fixes will be released in the next pre-release.
335
+
The preferred way to report security vulnerabilities is through
1. Visit the **Security** tab of the affected repository on GitHub.
344
+
2. Click **Report a vulnerability** and follow the provided steps.
345
+
346
+
This process applies to any repositories within the Express ecosystem.
347
+
If you are unsure whether a repository falls under this policy,
348
+
feel free to reach out via email.
349
+
350
+
#### Reporting via Email
351
+
352
+
If you prefer, you can also report security issues by emailing `express-security@lists.openjsf.org`.
353
+
354
+
To ensure a timely response, please include all relevant details directly in the email body rather than linking to external sources or attaching files.
355
+
356
+
The lead maintainer will acknowledge your email within 48 hours and provide an initial response outlining the next steps. The security team will keep you updated on the progress and may request additional details.
357
+
358
+
#### Third-Party Modules
359
+
360
+
If the security issue pertains to a third-party module that is not directly maintained within the Express ecosystem, please report it to the maintainers of that module.
336
361
337
362
### Disclosure Policy
338
363
@@ -345,15 +370,19 @@ involving the following steps:
345
370
- Prepare fixes for all releases still under maintenance. These fixes will be
346
371
released as fast as possible to npm.
347
372
348
-
### The Express Threat Model
349
-
350
-
We are currently working on a new version of the security model, the most updated version can be found [here](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md)
351
-
352
373
### Comments on this Policy
353
374
354
375
If you have suggestions on how this process could be improved please submit a
355
376
pull request.
356
377
378
+
### The Express Threat Model
379
+
380
+
The Express threat model defines the boundaries of what the framework considers its security responsibility. It establishes which elements are trusted (such as the developer, the runtime environment, and application code) versus untrusted (such as data from network connections). Issues arising from trusted elements are considered out of scope, while Express is responsible for safely handling untrusted data.
381
+
382
+
Many commonly reported concerns fall outside Express's security scope and are the responsibility of the application developer. Such as prototype pollution from unsanitized user input, misconfigured static file serving, or issues in third-party dependencies.
383
+
384
+
For complete details, see the [Express Threat Model](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md).
385
+
357
386
----
358
387
359
388
# Contributing to Expressjs.com {#expressjs-website-contributing}
0 commit comments