diff --git a/app/components/footer.hbs b/app/components/footer.hbs index a21a38407de..5c577b6bcb4 100644 --- a/app/components/footer.hbs +++ b/app/components/footer.hbs @@ -23,7 +23,7 @@
Safety is one of the core principles of Rust, and to that end, we would like to ensure that cargo and crates.io have - secure implementations. To learn more about disclosing security vulnerabilities for these tools, please reference the - Rust Security policy - for more details.
- -Note that this policy only applies to official Rust projects like crates.io and cargo, and not individual crates. The - crates.io team and the Security Response working group are not responsible for the disclosure of vulnerabilities to - specific crates, and if any issues are found, you should seek guidance from the individual crate owners and their - specific policies instead.
- -Thank you for taking the time to responsibly disclose any issues you find.
+Please see the
Please report violations of this policy to help@crates.io.
+This policy is partially based on
diff --git a/app/templates/policies/security.hbs b/app/templates/policies/security.hbs
new file mode 100644
index 00000000000..43404b4407d
--- /dev/null
+++ b/app/templates/policies/security.hbs
@@ -0,0 +1,55 @@
+ Safety is one of the core principles of Rust, and to that end, we would like to ensure that cargo, crates.io, docs.rs, and
+ related tools have secure implementations. To disclose security vulnerabilities in the crates.io service itself (as opposed
+ to crates hosted on crates.io) or any other repository in the rust-lang
+ organization, please follow the Rust Security policy. Thank you for taking the time to responsibly disclose any issues you find. To disclose security vulnerabilities found in a crate that is hosted on crates.io, seek guidance from the individual crate's
+ owners and their specific policies. Commonly, projects include a file named Intentionally malicious code is against The Rustsec Security Advisory Database maintains advisories about vulnerabilities in
+ crates published on crates.io. Maintained by the Secure
+ Code Working Group, the information is available in a variety of forms to incorporate into your development practices.
+ See their steps to submit a vulnerability to the database. Security is a value important to the Rust ecosystem as a whole, not just to the Rust language. If you are a crate author and
+ you have received a high impact/severity security bug report for your crate, the Rust Foundation and the Rust Project are
+ available to help manage the situation. The Rust Project or the Rust Foundation may also be the ones reaching out to you, if
+ they have been informed of a security issue. As part of its Security Initiative, the Rust
+ Foundation: The Rust Project can coordinate actions among other parts of the ecosystem that may need to be updated to address a fix. Please reach out to contact@rustfoundation.org if either the Rust Project or
+ the Rust Foundation can help you by providing security support in the areas listed above or in another way! These are just a
+ few examples of the kind of help available to crate authors facing security challenges.Security of crates.io itself
+
+ Security of crates hosted on crates.io
+
+ SECURITY.md
that contains the
+ crate's security policies and procedures.Rustsec Security Advisory Database for receiving security updates
+
+ Ecosystem security help for crate authors
+
+
+
+
+