8000 Security Overview · middyjs/middy · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Security: middyjs/middy

SECURITY.md

Security Policy

This document outlines security procedures and general policies for the Middy Open Source projects as found on https://github.com/middyjs.

Security Goals

Our goal is to ensure Middy meets security best practices as outlined by the following standards.

Core maintainers use Middy extensively within their own organizations that meet the above standards tested using SecurityHub and penetration testing.

Secure design principles

  • secure by default
  • use white lists
  • no backdoors
  • follow least privilege
  • keep it simple

Supported Versions

Only the latest version is supported for security updates.

Threat model

All options and configuration are assume to be trusted as we are configured by the implementing developer. It's up the implement IAM properly.

Trust Boundaries

Middy is implemented within AWS Lambda. The Lambda execution and configuration of middy is trusted. It's up to the implementing developer to apply input validation to ensure the event is properly structured and safe to use for the handler. User inputs to all packages are fuzzed.

Reporting a Vulnerability

The Middy OSS team and community take all security vulnerabilities seriously. Thank you for improving the security of our open source software. We appreciate your efforts and responsible disclosure and will make every effort to acknowledge your contributions.

Report security vulnerabilities by emailing the lead maintainer at:

willfarrell@proton.me

The lead maintainer will acknowledge your email within 24 hours, and will send a more detailed response within 48 hours indicating the next steps in handling your report. After the initial reply to your report, the security team will endeavour to keep you informed of the progress towards a fix and full announcement, and may ask for additional information or guidance.

Report security vulnerabilities in third-party modules to the person or team maintaining the module.

Disclosure Policy

When the security team receives a security bug report, they will assign it to a primary handler. This person will coordinate the fix and release process, involving the following steps:

  • Confirm the problem and determine the affected versions.
  • Audit code to find any potential similar problems.
  • Prepare fixes for all releases still under maintenance. These fixes will be released as fast as possible to NPM.

There aren’t any published security advisories

0