|
| 1 | +# Security Policy |
| 2 | + |
| 3 | +- **Last reviewed:** 2026-05-09 |
| 4 | +- **Review owner:** React on Rails maintainers |
| 5 | +- **Next review due:** 2027-05-09 |
| 6 | + |
| 7 | +## Supported Versions |
| 8 | + |
| 9 | +React on Rails does not yet publish fixed version numbers for security support. Report suspected vulnerabilities even |
| 10 | +when you find them in an older released React on Rails gem or npm package version; do not self-filter reports by |
| 11 | +version. Maintainers triage all reports, but fixes are normally prepared for the latest released minor line and supported |
| 12 | +upgrade paths first. |
| 13 | + |
| 14 | +| Version line | Security support | |
| 15 | +| ----------------------------------------------------------------- | --------------------------------------------------------------------- | |
| 16 | +| Latest released `react_on_rails` gem and `react-on-rails` package | Report and triage | |
| 17 | +| Older released versions | Report; maintainers evaluate case-by-case and may recommend upgrading | |
| 18 | + |
| 19 | +Fixes are generally delivered for the most recent minor line; older releases may receive backports if severity warrants. |
| 20 | + |
| 21 | +## Scope |
| 22 | + |
| 23 | +This policy covers security vulnerabilities in the `react_on_rails` gem and the `react-on-rails` npm package. It does |
| 24 | +not cover vulnerabilities in end-user Rails applications that happen to use React on Rails, vulnerabilities in |
| 25 | +third-party dependencies, or non-technical attacks such as phishing or social engineering. Vulnerabilities in |
| 26 | +`react_on_rails_pro` follow the same reporting process; use the same GitHub advisory path or email fallback below. |
| 27 | + |
| 28 | +## Reporting a Vulnerability |
| 29 | + |
| 30 | +Please do not open a public issue for suspected vulnerabilities. |
| 31 | + |
| 32 | +This repository has GitHub private vulnerability reporting enabled. Use that path when possible: |
| 33 | + |
| 34 | +1. Open the repository's **Security** tab on GitHub. |
| 35 | +2. Select **Report a vulnerability**. |
| 36 | +3. Include affected package versions, impact, and the smallest safe reproduction details you can share privately. |
| 37 | + |
| 38 | +If the repository does not show **Report a vulnerability** for your account, use the email fallback below. |
| 39 | + |
| 40 | +If a reporter cannot use GitHub, they may email [contact@shakacode.com](mailto:contact@shakacode.com) with the subject |
| 41 | +line `React on Rails security` and ask to be routed to a React on Rails maintainer for coordinated disclosure. In that |
| 42 | +first email, include the affected package name (`react_on_rails` gem or `react-on-rails` npm package), the version range, |
| 43 | +and a one-line impact description, such as "potential XSS in SSR helper" or "information disclosure in generator output." |
| 44 | +These three details are safe to send in plaintext. Do not include reproduction steps, proof-of-concept payloads, code |
| 45 | +snippets, stack traces, or any other technical exploit details in that first contact; maintainers will respond with a |
| 46 | +secure alternative, such as a private GitHub Advisory thread or another mutually agreed private channel, before |
| 47 | +requesting reproduction details. |
| 48 | + |
| 49 | +Alternatively, if you need an additional secure channel beyond the options above, mention it in your initial email and |
| 50 | +maintainers will arrange one before requesting reproduction details. |
| 51 | + |
| 52 | +Maintainers aim to provide an initial response within five business days. The default disclosure window is 90 days from |
| 53 | +the date of first report unless maintainers and the reporter agree to a shorter or longer timeline. If you do not |
| 54 | +receive an initial response within ten business days, send a follow-up to the same email address or private GitHub |
| 55 | +report thread. |
| 56 | + |
| 57 | +Maintainers must keep reports private until the issue is patched or disproven. An advisory or release note may be |
| 58 | +published only after a fix, mitigation, or explicit non-impact determination has been made — that is, once the disclosed |
| 59 | +reproduction details no longer help exploit supported releases. |
| 60 | + |
| 61 | +Reporters will be credited in the security advisory or release notes unless they request anonymity. |
| 62 | + |
| 63 | +Maintainers will request a CVE through GitHub's Security Advisory program for confirmed vulnerabilities affecting |
| 64 | +released versions of the gem or npm package and will include the CVE identifier in the security advisory when one is |
| 65 | +assigned. |
0 commit comments