Skip to content

Latest commit

 

History

History
35 lines (28 loc) · 1.65 KB

File metadata and controls

35 lines (28 loc) · 1.65 KB

AI agent instructions for security reports

Before suggesting, drafting, or filing a security report for this repository:

  1. Read SECURITY.md first, especially:
    • "The Node.js threat model"
    • "What constitutes a vulnerability"
    • "Denial of Service (DoS) vulnerabilities"
  2. Read the API documentation for the feature involved in the report.
  3. For common false positives, review these documents before concluding that a behavior is a vulnerability:

Do not recommend a security report when the behavior is already documented as:

  • expected behavior;
  • outside the Node.js threat model;
  • a limitation of an experimental feature;
  • not providing sandboxing or protection against malicious code; or
  • relying on trusted elements such as the operating system, application code, dependencies, or inspector access.

When producing a security assessment for Node.js:

  • cite the exact document and section used;
  • explain whether the behavior conflicts with a documented Node.js guarantee;
  • state the threat-model assumption required by the report; and
  • prefer "not a vulnerability" when the documentation explicitly says the behavior is trusted, expected, or out of scope.

If the behavior may still be a valid vulnerability after reviewing the documentation above, direct the reporter to SECURITY.md for the private reporting process via HackerOne.