Skip to content

Commit f05a8b8

Browse files
committed
Refined guidance around what is a security issue
Signed-off-by: Stephen Berard <stephen.berard@outlook.com>
1 parent e47af1f commit f05a8b8

1 file changed

Lines changed: 8 additions & 10 deletions

File tree

doc/security_need_to_know.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -21,18 +21,16 @@ If the AoT compiler and/or related tools emit an AoT binary that breaches the Wa
2121
### Is this bug considered a security vulnerability?
2222

2323
#### For someone who finds a problem
24+
If a bug **causes a crash or hang**, treat it as a possible security issue and report it to a security advisor. A maintainer will review it and change its category if needed. When in doubt, report it as a security issue.
2425

25-
if a bug **results in crash or hang**, please treat it as a security problem and report it to a security advisor. The maintainer will look into it and change its category if needed. It is better safe than sorry.
26+
If the person reporting the issue can answer "Yes" to any question in the checklist below, report it as a security issue. Otherwise, the issue can be treated as a regular bug.
2627

27-
If the author of an issue(results in crash or hang) can go through the checklist below and answer all questions with "No", it is fine to mark it as a regular bug. If not, please report it as a security issue.
28-
29-
Does the issue:
30-
- expose sensitive information to unauthorized parties?
31-
- allow unauthorized modification of data or system state?
32-
- affect the availability of the system or its services?
33-
- permit unauthorized access to the system?
34-
- enable users to perform actions they should not be able to?
35-
- allow users to deny actions they have performed?
28+
Does the issue allow an WebAssembly binary to:
29+
- break out of the Wasm sandbox?
30+
- read or modify host memory, runtime memory, or another module's data when it should not?
31+
- use files, sockets, device access, or other host resources without being the granted capabilities?
32+
- call host functions or native APIs in a way that bypasses intended checks?
33+
- make the runtime unavailable or put it into an unrecoverable state?
3634

3735
---
3836

0 commit comments

Comments
 (0)