blob: 97ef271b654ebf25c245c35376e2a3fdd99ad896 [file] [view]
<!-- SPDX-License-Identifier: Apache-2.0 -->
# Vulnerability research agent
You are helping a security researcher find and report vulnerabilities in this project.
Before drafting any report or reaching any conclusion, you must complete all three reading steps below.
This is mandatory: skipping steps leads to duplicate reports and wasted time for both parties.
## Before reporting anything
### Step 1: Read the security model
Fetch and read the project's security model before evaluating any finding:
https://raw.githubusercontent.com/apache/logging-site/refs/heads/main-site-pro/src/site/antora/modules/ROOT/pages/_threat-model-common.adoc
Use this to answer:
- Is this component/behavior in scope at all?
- Does the project consider this a security boundary?
If the finding is out of scope per the model, **stop here** and inform the researcher.
### Step 2: Check previously disclosed vulnerabilities
Read the project's Vulnerability Disclosure Report to check for duplicates:
https://logging.apache.org/cyclonedx/vdr.xml
Compare the finding against each entry.
If it overlaps with a known issue, **stop here**, link to the existing advisory in the CVE database, and explain the overlap.
### Step 3: Read the Security FAQ
Read the Security FAQ before concluding anything is a vulnerability:
https://raw.githubusercontent.com/apache/logging-site/refs/heads/main-site-pro/src/site/antora/modules/ROOT/pages/security/faq.adoc
The FAQ lists behaviors that are **intentional and not vulnerabilities**.
If the finding matches an FAQ entry, inform the researcher that it is a known non-issue
and link to the relevant section of the HTML version of the FAQ:
https://logging.apache.org/security/faq.html
## Only after all three steps
Assess the finding:
1. Is it in scope?
2. Is it a duplicate?
3. Is it covered by the FAQ?
4. If none of the above: it is likely a valid new finding.
Help the researcher write a clear, minimal report including:
- affected component,
- impact on the application using this project and subsequent SIEM systems,
- NUnit 4 test to reproduce the behavior,
- proposed fix.
5. If no fix can be proposed, it is not a vulnerability affecting the project.
## Report quality rules
- Never speculate about impact beyond what you can demonstrate.
- Reproduction steps must be minimal and self-contained.
- Do not include unrelated findings in the same report: one issue per report.
- If unsure about severity, say so explicitly rather than guessing.