Qualquer pessoa com permissões de administrador em um repositório pode criar uma consultoria de segurança.
Anyone with admin permissions to a repository also has admin permissions to all security advisories in that repository. People with admin permissions to a security advisory can add collaborators, and collaborators have write permissions to the security advisory.
Consultoria de segurança GitHub allows repository maintainers to privately discuss and fix a security vulnerability in a project. After collaborating on a fix, repository maintainers can publish the security advisory to publicly disclose the security vulnerability to the project's community. By publishing security advisories, repository maintainers make it easier for their community to update package dependencies and research the impact of the security vulnerabilities.
With Consultoria de segurança GitHub, you can:
- Create a draft security advisory, and use the draft to privately discuss the impact of the vulnerability on your project.
- Colaborar de modo particular com a correção da vulnerabilidade em uma bifurcação privada temporária.
- Publish the security advisory to alert your community of the vulnerability.
You can also use Consultoria de segurança GitHub to republish the details of a security vulnerability that you have already disclosed elsewhere by copying and pasting the details of the vulnerability into a new security advisory.
To get started, see "Creating a security advisory."
You can give credit to individuals who contributed to a security advisory. For more information, see "Editing a security advisory."
You can create a security policy to give people instructions for responsibly reporting security vulnerabilities in your project. Para obter mais informações, consulte "Adicionar uma política de segurança ao seu repositório".
You can also join Laboratório de Segurança GitHub to browse security-related topics and contribute to security tools and projects.
Consultoria de segurança GitHub builds upon the foundation of the Common Vulnerabilities and Exposures (CVE) list. GitHub is a CVE Numbering Authority (CNA) and is authorized to assign CVE identification numbers. For more information, see "About CVE" and "CVE Numbering Authorities" on the CVE website.
When you create a security advisory for a public repository on GitHub, you have the option of providing an existing CVE identification number for the security vulnerability. If you don't already have a CVE identification number for the security vulnerability in your project, you can request a CVE identification number from GitHub. Assigning a CVE identification number generally takes 72 hours or less. For more information, see "Publishing a security advisory."
GitHub will review each published security advisory, add it to the Banco de Dados Consultivo GitHub, and may use the security advisory to send security alerts to affected repositories. If the security advisory comes from a fork, we'll only send an alert if the fork owns a package, published under a unique name, on a public package registry. This process can take up to 72 hours and GitHub may contact you for more information.
For more information about security alerts, see "About security alerts for vulnerable dependencies." For more information about Banco de Dados Consultivo GitHub, see "Browsing security vulnerabilities in the Banco de Dados Consultivo GitHub."