Skip to content

Commit df7c2e3

Browse files
github-actions[bot]bjohansebascarlosstenzel
authored
i18n: new crowdin translations (#2164)
Co-authored-by: Crowdin Bot <support+bot@crowdin.com> Co-authored-by: bjohansebas <103585995+bjohansebas@users.noreply.github.com> Co-authored-by: carlosstenzel <3890516+carlosstenzel@users.noreply.github.com>
1 parent 5efeac8 commit df7c2e3

15 files changed

Lines changed: 488 additions & 227 deletions

File tree

de/resources/contributing.md

Lines changed: 53 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -297,42 +297,67 @@ visibility or maintainer input.
297297

298298
## Security Policies and Procedures
299299

300-
<!-- SRC: expressjs/express SECURITY.md -->
300+
<!-- SRC: expressjs/.github SECURITY.md -->
301301

302302
This document outlines security procedures and general policies for the Express
303303
project.
304304

305-
- [Reporting a Bug](#reporting-a-bug)
305+
- [Reporting a Bug or Security Vulnerability](#reporting-a-bug-or-security-vulnerability)
306306
- [Disclosure Policy](#disclosure-policy)
307307
- [Comments on this Policy](#comments-on-this-policy)
308+
- [The Express Threat Model](#the-express-threat-model)
308309

309-
### Reporting a Bug
310+
### Reporting a Bug or Security Vulnerability
310311

311-
The Express team and community take all security bugs in Express seriously.
312-
Thank you for improving the security of Express. We appreciate your efforts and
313-
responsible disclosure and will make every effort to acknowledge your
314-
contributions.
312+
> [!IMPORTANT]
313+
> Before reporting a vulnerability, please review the [Express Threat Model](#the-express-threat-model) to check if the issue falls within Express's security scope.
315314
316-
Report security bugs by emailing `express-security@lists.openjsf.org`.
315+
The Express team and community take all security vulnerabilities seriously.
316+
Thank you for improving the security of Express and related projects.
317+
We appreciate your efforts in responsible disclosure and will make every effort
318+
to acknowledge your contributions.
317319

318-
To ensure the timely response to your report, please ensure that the entirety
319-
of the report is contained within the email body and not solely behind a web
320-
link or an attachment.
320+
A [Security triage team member](https://github.com/expressjs/security-wg#security-triage-team-expressjssecurity-triage)
321+
or [the repo captain](https://github.com/expressjs/discussions/blob/master/docs/contributing/captains_and_committers.md)
322+
will acknowledge your report as soon as possible.
323+
These timelines may extend when our triage
324+
volunteers are away on holiday, particularly at the end of the year.
321325

322-
The lead maintainer will acknowledge your email within 48 hours, and will send a
323-
more detailed response within 48 hours indicating the next steps in handling
324-
your report. After the initial reply to your report, the security team will
326+
After the initial reply to your report, the security team will
325327
endeavor to keep you informed of the progress towards a fix and full
326328
announcement, and may ask for additional information or guidance.
327329

328-
Report security bugs in third-party modules to the person or team maintaining
329-
the module.
330+
> [!NOTE]
331+
> You can find more information about our process in [this guide](https://github.com/expressjs/security-wg/blob/main/docs/incident_response_plan.md)
330332
331-
### Pre-release Versions
333+
#### Reporting Security Bugs via GitHub Security Advisory (Preferred)
332334

333-
Alpha and Beta releases are unstable and **not suitable for production use**.
334-
Vulnerabilities found in pre-releases should be reported according to the [Reporting a Bug](#reporting-a-bug) section.
335-
Due to the unstable nature of the branch it is not guaranteed that any fixes will be released in the next pre-release.
335+
The preferred way to report security vulnerabilities is through
336+
[GitHub Security Advisories](https://github.com/advisories).
337+
This allows us to collaborate on a fix while maintaining the
338+
confidentiality of the report.
339+
340+
To report a vulnerability
341+
([docs](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability)):
342+
343+
1. Visit the **Security** tab of the affected repository on GitHub.
344+
2. Click **Report a vulnerability** and follow the provided steps.
345+
346+
This process applies to any repositories within the Express ecosystem.
347+
If you are unsure whether a repository falls under this policy,
348+
feel free to reach out via email.
349+
350+
#### Reporting via Email
351+
352+
If you prefer, you can also report security issues by emailing `express-security@lists.openjsf.org`.
353+
354+
To ensure a timely response, please include all relevant details directly in the email body rather than linking to external sources or attaching files.
355+
356+
The lead maintainer will acknowledge your email within 48 hours and provide an initial response outlining the next steps. The security team will keep you updated on the progress and may request additional details.
357+
358+
#### Third-Party Modules
359+
360+
If the security issue pertains to a third-party module that is not directly maintained within the Express ecosystem, please report it to the maintainers of that module.
336361

337362
### Disclosure Policy
338363

@@ -345,15 +370,19 @@ involving the following steps:
345370
- Prepare fixes for all releases still under maintenance. These fixes will be
346371
released as fast as possible to npm.
347372

348-
### The Express Threat Model
349-
350-
We are currently working on a new version of the security model, the most updated version can be found [here](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md)
351-
352373
### Comments on this Policy
353374

354375
If you have suggestions on how this process could be improved please submit a
355376
pull request.
356377

378+
### The Express Threat Model
379+
380+
The Express threat model defines the boundaries of what the framework considers its security responsibility. It establishes which elements are trusted (such as the developer, the runtime environment, and application code) versus untrusted (such as data from network connections). Issues arising from trusted elements are considered out of scope, while Express is responsible for safely handling untrusted data.
381+
382+
Many commonly reported concerns fall outside Express's security scope and are the responsibility of the application developer. Such as prototype pollution from unsanitized user input, misconfigured static file serving, or issues in third-party dependencies.
383+
384+
For complete details, see the [Express Threat Model](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md).
385+
357386
----
358387

359388
# Contributing to Expressjs.com {#expressjs-website-contributing}

es/resources/contributing.md

Lines changed: 53 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -297,42 +297,67 @@ visibility or maintainer input.
297297

298298
## Security Policies and Procedures
299299

300-
<!-- SRC: expressjs/express SECURITY.md -->
300+
<!-- SRC: expressjs/.github SECURITY.md -->
301301

302302
This document outlines security procedures and general policies for the Express
303303
project.
304304

305-
- [Reporting a Bug](#reporting-a-bug)
305+
- [Reporting a Bug or Security Vulnerability](#reporting-a-bug-or-security-vulnerability)
306306
- [Disclosure Policy](#disclosure-policy)
307307
- [Comments on this Policy](#comments-on-this-policy)
308+
- [The Express Threat Model](#the-express-threat-model)
308309

309-
### Reporting a Bug
310+
### Reporting a Bug or Security Vulnerability
310311

311-
The Express team and community take all security bugs in Express seriously.
312-
Thank you for improving the security of Express. We appreciate your efforts and
313-
responsible disclosure and will make every effort to acknowledge your
314-
contributions.
312+
> [!IMPORTANT]
313+
> Before reporting a vulnerability, please review the [Express Threat Model](#the-express-threat-model) to check if the issue falls within Express's security scope.
315314
316-
Report security bugs by emailing `express-security@lists.openjsf.org`.
315+
The Express team and community take all security vulnerabilities seriously.
316+
Thank you for improving the security of Express and related projects.
317+
We appreciate your efforts in responsible disclosure and will make every effort
318+
to acknowledge your contributions.
317319

318-
To ensure the timely response to your report, please ensure that the entirety
319-
of the report is contained within the email body and not solely behind a web
320-
link or an attachment.
320+
A [Security triage team member](https://github.com/expressjs/security-wg#security-triage-team-expressjssecurity-triage)
321+
or [the repo captain](https://github.com/expressjs/discussions/blob/master/docs/contributing/captains_and_committers.md)
322+
will acknowledge your report as soon as possible.
323+
These timelines may extend when our triage
324+
volunteers are away on holiday, particularly at the end of the year.
321325

322-
The lead maintainer will acknowledge your email within 48 hours, and will send a
323-
more detailed response within 48 hours indicating the next steps in handling
324-
your report. After the initial reply to your report, the security team will
326+
After the initial reply to your report, the security team will
325327
endeavor to keep you informed of the progress towards a fix and full
326328
announcement, and may ask for additional information or guidance.
327329

328-
Report security bugs in third-party modules to the person or team maintaining
329-
the module.
330+
> [!NOTE]
331+
> You can find more information about our process in [this guide](https://github.com/expressjs/security-wg/blob/main/docs/incident_response_plan.md)
330332
331-
### Pre-release Versions
333+
#### Reporting Security Bugs via GitHub Security Advisory (Preferred)
332334

333-
Alpha and Beta releases are unstable and **not suitable for production use**.
334-
Vulnerabilities found in pre-releases should be reported according to the [Reporting a Bug](#reporting-a-bug) section.
335-
Due to the unstable nature of the branch it is not guaranteed that any fixes will be released in the next pre-release.
335+
The preferred way to report security vulnerabilities is through
336+
[GitHub Security Advisories](https://github.com/advisories).
337+
This allows us to collaborate on a fix while maintaining the
338+
confidentiality of the report.
339+
340+
To report a vulnerability
341+
([docs](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability)):
342+
343+
1. Visit the **Security** tab of the affected repository on GitHub.
344+
2. Click **Report a vulnerability** and follow the provided steps.
345+
346+
This process applies to any repositories within the Express ecosystem.
347+
If you are unsure whether a repository falls under this policy,
348+
feel free to reach out via email.
349+
350+
#### Reporting via Email
351+
352+
If you prefer, you can also report security issues by emailing `express-security@lists.openjsf.org`.
353+
354+
To ensure a timely response, please include all relevant details directly in the email body rather than linking to external sources or attaching files.
355+
356+
The lead maintainer will acknowledge your email within 48 hours and provide an initial response outlining the next steps. The security team will keep you updated on the progress and may request additional details.
357+
358+
#### Third-Party Modules
359+
360+
If the security issue pertains to a third-party module that is not directly maintained within the Express ecosystem, please report it to the maintainers of that module.
336361

337362
### Disclosure Policy
338363

@@ -345,15 +370,19 @@ involving the following steps:
345370
- Prepare fixes for all releases still under maintenance. These fixes will be
346371
released as fast as possible to npm.
347372

348-
### The Express Threat Model
349-
350-
We are currently working on a new version of the security model, the most updated version can be found [here](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md)
351-
352373
### Comments on this Policy
353374

354375
If you have suggestions on how this process could be improved please submit a
355376
pull request.
356377

378+
### The Express Threat Model
379+
380+
The Express threat model defines the boundaries of what the framework considers its security responsibility. It establishes which elements are trusted (such as the developer, the runtime environment, and application code) versus untrusted (such as data from network connections). Issues arising from trusted elements are considered out of scope, while Express is responsible for safely handling untrusted data.
381+
382+
Many commonly reported concerns fall outside Express's security scope and are the responsibility of the application developer. Such as prototype pollution from unsanitized user input, misconfigured static file serving, or issues in third-party dependencies.
383+
384+
For complete details, see the [Express Threat Model](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md).
385+
357386
----
358387

359388
# Contributing to Expressjs.com {#expressjs-website-contributing}

fr/resources/contributing.md

Lines changed: 53 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -297,42 +297,67 @@ visibility or maintainer input.
297297

298298
## Security Policies and Procedures
299299

300-
<!-- SRC: expressjs/express SECURITY.md -->
300+
<!-- SRC: expressjs/.github SECURITY.md -->
301301

302302
This document outlines security procedures and general policies for the Express
303303
project.
304304

305-
- [Reporting a Bug](#reporting-a-bug)
305+
- [Reporting a Bug or Security Vulnerability](#reporting-a-bug-or-security-vulnerability)
306306
- [Disclosure Policy](#disclosure-policy)
307307
- [Comments on this Policy](#comments-on-this-policy)
308+
- [The Express Threat Model](#the-express-threat-model)
308309

309-
### Reporting a Bug
310+
### Reporting a Bug or Security Vulnerability
310311

311-
The Express team and community take all security bugs in Express seriously.
312-
Thank you for improving the security of Express. We appreciate your efforts and
313-
responsible disclosure and will make every effort to acknowledge your
314-
contributions.
312+
> [!IMPORTANT]
313+
> Before reporting a vulnerability, please review the [Express Threat Model](#the-express-threat-model) to check if the issue falls within Express's security scope.
315314
316-
Report security bugs by emailing `express-security@lists.openjsf.org`.
315+
The Express team and community take all security vulnerabilities seriously.
316+
Thank you for improving the security of Express and related projects.
317+
We appreciate your efforts in responsible disclosure and will make every effort
318+
to acknowledge your contributions.
317319

318-
To ensure the timely response to your report, please ensure that the entirety
319-
of the report is contained within the email body and not solely behind a web
320-
link or an attachment.
320+
A [Security triage team member](https://github.com/expressjs/security-wg#security-triage-team-expressjssecurity-triage)
321+
or [the repo captain](https://github.com/expressjs/discussions/blob/master/docs/contributing/captains_and_committers.md)
322+
will acknowledge your report as soon as possible.
323+
These timelines may extend when our triage
324+
volunteers are away on holiday, particularly at the end of the year.
321325

322-
The lead maintainer will acknowledge your email within 48 hours, and will send a
323-
more detailed response within 48 hours indicating the next steps in handling
324-
your report. After the initial reply to your report, the security team will
326+
After the initial reply to your report, the security team will
325327
endeavor to keep you informed of the progress towards a fix and full
326328
announcement, and may ask for additional information or guidance.
327329

328-
Report security bugs in third-party modules to the person or team maintaining
329-
the module.
330+
> [!NOTE]
331+
> You can find more information about our process in [this guide](https://github.com/expressjs/security-wg/blob/main/docs/incident_response_plan.md)
330332
331-
### Pre-release Versions
333+
#### Reporting Security Bugs via GitHub Security Advisory (Preferred)
332334

333-
Alpha and Beta releases are unstable and **not suitable for production use**.
334-
Vulnerabilities found in pre-releases should be reported according to the [Reporting a Bug](#reporting-a-bug) section.
335-
Due to the unstable nature of the branch it is not guaranteed that any fixes will be released in the next pre-release.
335+
The preferred way to report security vulnerabilities is through
336+
[GitHub Security Advisories](https://github.com/advisories).
337+
This allows us to collaborate on a fix while maintaining the
338+
confidentiality of the report.
339+
340+
To report a vulnerability
341+
([docs](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability)):
342+
343+
1. Visit the **Security** tab of the affected repository on GitHub.
344+
2. Click **Report a vulnerability** and follow the provided steps.
345+
346+
This process applies to any repositories within the Express ecosystem.
347+
If you are unsure whether a repository falls under this policy,
348+
feel free to reach out via email.
349+
350+
#### Reporting via Email
351+
352+
If you prefer, you can also report security issues by emailing `express-security@lists.openjsf.org`.
353+
354+
To ensure a timely response, please include all relevant details directly in the email body rather than linking to external sources or attaching files.
355+
356+
The lead maintainer will acknowledge your email within 48 hours and provide an initial response outlining the next steps. The security team will keep you updated on the progress and may request additional details.
357+
358+
#### Third-Party Modules
359+
360+
If the security issue pertains to a third-party module that is not directly maintained within the Express ecosystem, please report it to the maintainers of that module.
336361

337362
### Disclosure Policy
338363

@@ -345,15 +370,19 @@ involving the following steps:
345370
- Prepare fixes for all releases still under maintenance. These fixes will be
346371
released as fast as possible to npm.
347372

348-
### The Express Threat Model
349-
350-
We are currently working on a new version of the security model, the most updated version can be found [here](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md)
351-
352373
### Comments on this Policy
353374

354375
If you have suggestions on how this process could be improved please submit a
355376
pull request.
356377

378+
### The Express Threat Model
379+
380+
The Express threat model defines the boundaries of what the framework considers its security responsibility. It establishes which elements are trusted (such as the developer, the runtime environment, and application code) versus untrusted (such as data from network connections). Issues arising from trusted elements are considered out of scope, while Express is responsible for safely handling untrusted data.
381+
382+
Many commonly reported concerns fall outside Express's security scope and are the responsibility of the application developer. Such as prototype pollution from unsanitized user input, misconfigured static file serving, or issues in third-party dependencies.
383+
384+
For complete details, see the [Express Threat Model](https://github.com/expressjs/security-wg/blob/main/docs/ThreatModel.md).
385+
357386
----
358387

359388
# Contributing to Expressjs.com {#expressjs-website-contributing}

0 commit comments

Comments
 (0)