You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@druid.apache.org by "raboof (via GitHub)" <gi...@apache.org> on 2023/03/10 16:56:41 UTC

[GitHub] [druid] raboof commented on a diff in pull request #13886: Document how to report security issues

raboof commented on code in PR #13886:
URL: https://github.com/apache/druid/pull/13886#discussion_r1132623571


##########
docs/operations/security-overview.md:
##########
@@ -272,3 +272,19 @@ Cluster to deep storage:
 Cluster to client:
 1. Druid authenticates with the client based on the configured authenticator.
 2. Druid only performs actions when an authorizer grants permission. The default configuration is `allowAll authorizer`.
+
+## Reporting security issues
+
+The Apache Druid team takes security very seriously. If you find a potential security issue in Druid, such as a way to bypass the security mechanisms described earlier, please report this problem to [security@apache.org](mailto:security@apache.org). This is a private mailing list. Please send one plain text email for each vulnerability you are reporting.

Review Comment:
   I'll do you one better: I updated the link check script to skip `mailto:` links and verified with `npm run build` that it correctly creates a mailto link



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscribe@druid.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@druid.apache.org
For additional commands, e-mail: commits-help@druid.apache.org