Skip to content

Commit 52fc67a

Browse files
committed
Added security policy.
1 parent 532d583 commit 52fc67a

File tree

1 file changed

+24
-0
lines changed

1 file changed

+24
-0
lines changed

SECURITY.md

+24
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
# Security Policy
2+
3+
## Latest Versions
4+
5+
We advise users to run or update to the most recent release of njs. Older versions may not have all enhancements and/or bug fixes applied to them.
6+
7+
## Special Considerations
8+
9+
njs does not evaluate dynamic code, especially code received from the network, in any way. The only way to evaluate such code using njs is to configure the `js_import` directive in nginx. JavaScript code is loaded once during nginx start.
10+
11+
In the nginx/njs threat model, JavaScript code is considered a trusted source in the same way as `nginx.conf` and site certificates. This means in practice:
12+
13+
- Memory disclosure and other security issues triggered by JavaScript code modification are not considered security issues, but as ordinary bugs.
14+
- Measures should be taken to protect JavaScript code used by njs.
15+
- If no `js_import` directives are present in `nginx.conf`, nginx is safe from JavaScript-related vulnerabilities.
16+
17+
## Reporting a Vulnerability
18+
19+
The F5 Security Incident Response Team (F5 SIRT) has an email alias that makes it easy to report potential security vulnerabilities.
20+
21+
- If you’re an F5 customer with an active support contract, please contact [F5 Technical Support](https://www.f5.com/services/support).
22+
- If you aren’t an F5 customer, please report any potential or current instances of security vulnerabilities with any F5 product to the F5 Security Incident Response Team at F5SIRT@f5.com
23+
24+
For more information visit [https://www.f5.com/services/support/report-a-vulnerability](https://www.f5.com/services/support/report-a-vulnerability)

0 commit comments

Comments
 (0)