ResQ takes the safety of its users and contributors seriously. This policy applies to every repository under resq-software.
For libraries and binaries cut via release-plz, only the latest minor release line receives patches. If you're running an older line, upgrade before reporting — the issue may already be resolved.
| Product | Supported |
|---|---|
resq-cli (via crates) |
latest 0.x.y |
resq-dsa (library) |
latest 0.x.y |
@resq-sw/* npm packages |
latest 0.x.y |
| Other packages | latest published version |
Do not open a public issue for a suspected vulnerability. Public disclosure before a fix is available puts users at risk.
Use one of the private channels below:
- GitHub Security Advisories (preferred): open a draft advisory on the affected repo at
https://github.com/resq-software/<repo>/security/advisories/new. If you're unsure which repo, file againstresq-software/.githuband we'll route internally. - Email:
security@resq.software.
Please include:
- Affected repo + commit SHA or release tag
- A short description of the issue and its impact
- Steps to reproduce (a minimal proof-of-concept is ideal)
- Any suggested mitigation if you have one
| Window | What happens |
|---|---|
| 48 hours | Initial acknowledgement from a maintainer |
| 7 days | Triage decision: confirmed / needs-info / not-applicable |
| 30 days | Fix landed on main for confirmed issues; coordinated disclosure window opens |
| 90 days | Public disclosure (GitHub Security Advisory published + CVE requested where applicable), unless we've agreed to a longer embargo |
We credit reporters in advisory text unless they ask to remain anonymous.
- Code, configuration, and infrastructure manifests in any public
resq-softwarerepository. - The
resqCLI binary distributed viaresq-software/cratesGitHub Releases. - The canonical git hooks shipped via
resq-software/dev.
- Dependencies maintained by third parties — report upstream; we'll consume the fix when it lands. (That said, if an advisory affects us materially, we want to know.)
- Social engineering, physical access, denial-of-service via traffic volume.
- Self-XSS, missing security headers on non-sensitive marketing pages.
Every repo runs the reusable security-scan workflow on push + PR + weekly schedule: CodeQL, Gitleaks, OSV-Scanner, Dependency Review, plus optional Snyk when SNYK_TOKEN is configured. Findings are triaged by the maintainers listed in each repo's CODEOWNERS.