Skip to content

Commit 6ddfec4

Browse files
authored
Merge pull request #10731 from NuGet/main
Merge latest main into dev
2 parents 11fd8f7 + ee811c3 commit 6ddfec4

5 files changed

Lines changed: 19 additions & 25 deletions

File tree

RemovedPackages.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,13 @@ Scanning is not perfect. Community partnership is a very valuable part of the ov
101101
| SolnetWallet.Net.Core | 01/27/2026 | Potentially Malicious |
102102
| Z.Dp.All 1.0.1 | 01/27/2026 | Malware |
103103
| Z.Dp.All 1.0.2 | 01/27/2026 | Malware |
104-
104+
| ZSeal.Hart.Licensing.Native | 02/17/2026 | Potentially Malicious |
105+
| StripeApi.Net | 02/19/2026 | Potentially Malicious |
106+
| qPapel.Auth | 02/19/2026 | Malware |
107+
| DOMOAuth2_ | 02/20/2026 | Potentially Malicious |
108+
| NCryptYo | 02/20/2026 | Malware |
109+
| SimpleWriter_ | 02/20/2026 | Potentially Malicious |
110+
| IRAOAuth2.0 | 02/20/2026 | Potentially Malicious |
105111

106112

107113
Legend:

SECURITY.md

Lines changed: 7 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -10,25 +10,13 @@ Microsoft serves as the primary maintainer of this repository. If you believe yo
1010

1111
**Please do not report security vulnerabilities through public GitHub issues.**
1212

13-
Instead, please report them to the Microsoft Security Response Center (MSRC) at [https://msrc.microsoft.com/create-report](https://aka.ms/opensource/security/create-report).
14-
15-
If you prefer to submit without logging in, send email to [[email protected]](mailto:[email protected]). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://aka.ms/opensource/security/pgpkey).
16-
17-
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://aka.ms/opensource/security/msrc).
18-
19-
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
20-
21-
* Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
22-
* Full paths of source file(s) related to the manifestation of the issue
23-
* The location of the affected source code (tag/branch/commit or direct URL)
24-
* Any special configuration required to reproduce the issue
25-
* Step-by-step instructions to reproduce the issue
26-
* Proof-of-concept or exploit code (if possible)
27-
* Impact of the issue, including how an attacker might exploit the issue
28-
29-
This information will help us triage your report more quickly.
30-
31-
If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program](https://aka.ms/opensource/security/bounty) page for more details about our active programs.
13+
Security issues and bugs should be reported privately to the Microsoft Security Response Center (MSRC), via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/new).
14+
15+
You should receive a response within 24 hours. If for some reason you do not, please follow up via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/), using the Message functionality found at the bottom of the Activity tab on your vulnerability report.
16+
17+
Further information can be found in the MSRC [Report an issue and submission guidelines](https://www.microsoft.com/en-us/msrc/faqs-report-an-issue).
18+
19+
Reports via MSRC may qualify for the Microsoft Open Source Bug Bounty. Details of the Microsoft Open Source Bug Bounty Program including terms and conditions are at [https://aka.ms/corebounty](https://aka.ms/corebounty).
3220

3321
## Preferred Languages
3422

build/sign-binaries.proj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
</PropertyGroup>
1212

1313
<ItemGroup>
14-
<_ProjectsToSign Condition="'$(ProjectsToSign)' == ''" Include="$(RepositoryRootDirectory)src\**\*.csproj" />
14+
<_ProjectsToSign Condition="'$(ProjectsToSign)' == ''" Include="$([MSBuild]::EnsureTrailingSlash('$(RepositoryRootDirectory)'))src\**\*.csproj" />
1515
<_ProjectsToSign Condition="'$(ProjectsToSign)' != ''" Include="$(ProjectsToSign)" />
1616
</ItemGroup>
1717

build/sign-packages.proj

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111

1212
<Target Name="GetOutputNupkgs">
1313
<ItemGroup>
14-
<FilesToSign Include="$(RepositoryRootDirectory)artifacts\*.nupkg">
14+
<FilesToSign Include="$([MSBuild]::EnsureTrailingSlash('$(RepositoryRootDirectory)'))artifacts\*.nupkg">
1515
<Authenticode>NuGet</Authenticode>
1616
</FilesToSign>
1717
</ItemGroup>
@@ -21,4 +21,4 @@
2121
<Target Name="AfterBuild" DependsOnTargets="$(SignTargetsDependOn)"/>
2222

2323
<Import Project="..\packages\MicroBuild.Core\build\MicroBuild.Core.targets" Condition="Exists('..\packages\MicroBuild.Core\build\MicroBuild.Core.targets')" />
24-
</Project>
24+
</Project>

build/sign.microbuild.targets

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@
6666
there is a project reference pointing to the current project and there is a copy of this output assembly in the
6767
bin directory of another project. That assembly also needs to be signed.
6868
-->
69-
<_ManagedOutputToSign Include="$(RepositoryRootDirectory)**\$(TargetFileName)" Condition="'$(BatchSign)' == 'true' AND '$(TargetFileName)' != ''" />
69+
<_ManagedOutputToSign Include="$([MSBuild]::EnsureTrailingSlash('$(RepositoryRootDirectory)'))**\$(TargetFileName)" Condition="'$(BatchSign)' == 'true' AND '$(TargetFileName)' != ''" />
7070
<_ManagedOutputToSign Remove="$(RunCommand)" Condition="'$(RunCommand)' != ''" />
7171
<UnfilteredFilesToSign
7272
Include="$([System.IO.Path]::GetFullPath('%(_ManagedOutputToSign.Identity)'))"
@@ -94,7 +94,7 @@
9494
by default as well.
9595
-->
9696
<_UnmanagedOutputToSign Include="$(RunCommand)" KeepDuplicates="false" Condition="'$(BatchSign)' == 'true' AND '$(RunCommand)' != ''" />
97-
<_UnmanagedOutputToSign Include="$(RepositoryRootDirectory)**\apphost.exe" Condition="'$(BatchSign)' == 'true'" />
97+
<_UnmanagedOutputToSign Include="$([MSBuild]::EnsureTrailingSlash('$(RepositoryRootDirectory)'))**\apphost.exe" Condition="'$(BatchSign)' == 'true'" />
9898
<UnfilteredFilesToSign
9999
Include="$([System.IO.Path]::GetFullPath('%(_UnmanagedOutputToSign.Identity)'))"
100100
Condition="Exists('%(_UnmanagedOutputToSign.Identity)')"

0 commit comments

Comments
 (0)