Skip to content

Conversation

@rvagg
Copy link
Member

@rvagg rvagg commented Nov 29, 2016

Got some suggestions?

@indutny
Copy link
Member

indutny commented Nov 29, 2016

👍

@evilpacket
Copy link
Contributor

👍

@deian
Copy link
Member

deian commented Nov 30, 2016

This may be a bit pedantic, but I think safety (e.g., memory and type safety) seems like a related important goal for something like this group (even though they may not always have security implications).

* Define and maintain security policies and procedures for:
- the core Node.js project
- other projects maintained by the Node.js Foundation technical group
* Define and maintain policies and procedures for the coordination of security concerns within the external Node.js open source ecosystem
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would add, "help maintainers fix high-impact security vulnerabilities". We have huge technical skills in the team, and we might help maintainers in need. Maintaining OSS is hard, and having a place where they can ask for help might be very interesting.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would certainly be good to have a process in place to help developers mitigate those node related security issues. This, of course could take quite a few forms from helping with PRs to writing up guides and documentation

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure if this belongs in here, but I would at you may want to word this appropriately, perhaps has "offer to help" or something, as I wouldn't want this to cause friction within the module space. Sometimes there are different ways to fix a security issue, and different opinions on what is inherent to a API vs an actual security issue, so wouldn't want to see people feeling like the WG is imposing themselves & opinions down on modules like law outside of the foundation :)

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dougwilson let me rephrase this. There are certain vulnerabilities in the ecosystem that can affect the full Node.js project, and the public image of the Node community. We need a group of people that can help dealing with those, and possibly contain the fallout. It's not imposing, but it is if the ecosystem does not fix the issue, then we can help providing either resources or help to do it.

From a end-user point of view, if split2 has a security or DoS vulnerability, and I am hit by a truck, someone should be notified and deal with the issue.

@evilpacket
Copy link
Contributor

evilpacket commented Dec 1, 2016 via email

@mhdawson
Copy link
Member

Any relevant content from here should be merged into #9 in favor of this pull request. @sam-github

@sam-github
Copy link
Contributor

I merged all the content from #1 to #9

@rvagg can we close #1 in favour of #9, or would you like to pull text from #9 into here, and I'll close #9?

- the external Node.js open source ecosystem
* Promote improvement of security practices within the Node.js ecosystem
* Recommend security improvements for the core Node.js project
* Facilitate and promote the expansion of a healthy security service and product provider ecosystem
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What would it mean in terms of actions? I don't fully understand that point. :/

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@sam-github
Copy link
Contributor

#9 landed, so closing this (Rod can always open it again if he wants to rebase or add to it)

@sam-github sam-github closed this Jul 13, 2017
@sam-github sam-github deleted the purpose branch July 13, 2017 22:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.