Skip to content

Commit 0486eaf

Browse files
committed
Deploying to main from @ c6f61e747c2153d612785f9f3ec9aafa3c32cfe1 🚀
1 parent 5620c8b commit 0486eaf

File tree

4 files changed

+12
-5
lines changed

4 files changed

+12
-5
lines changed

extensions.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -302,7 +302,7 @@ <h5 class="card-title">Home IdP Discovery</h5>
302302
<div class="d-flex align-items-center">
303303
<img src="resources/images/github.png" width="16px" alt="GitHub logo"
304304
class="me-2"/>
305-
<span>317 stars</span>
305+
<span>318 stars</span>
306306
</div>
307307
</div>
308308
</div>
@@ -659,7 +659,7 @@ <h5 class="card-title">kcwarden - Keycloak Config Auditor</h5>
659659
<div class="d-flex align-items-center">
660660
<img src="resources/images/github.png" width="16px" alt="GitHub logo"
661661
class="me-2"/>
662-
<span>78 stars</span>
662+
<span>79 stars</span>
663663
</div>
664664
</div>
665665
</div>

security.html

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,13 +92,20 @@ <h2>Reporting a Suspected Vulnerability</h2>
9292

9393
<h3>Supported Versions</h3>
9494
<p>Depending on the severity of a vulnerability the issue may be fixed in the current <code>major.minor</code> release of Keycloak, or for lower severity vulnerabilities or hardening in the following <code>major.minor</code> release. Refer to <a href="https://www.keycloak.org/downloads">https://www.keycloak.org/downloads</a> to find the latest release.</p>
95-
<p>If you are unable to regularly upgrade Keycloak we encourage you to consider <a href="https://access.redhat.com/products/red-hat-build-of-keycloak/">Red Hat build of Keycloak</a>, which offers <a href="https://access.redhat.com/support/policy/updates/red_hat_build_of_keycloak_notes">long term support</a> of specific versions of Keycloak.</p>
95+
<p>If you are unable to regularly upgrade Keycloak, we encourage you to consider <a href="https://access.redhat.com/products/red-hat-build-of-keycloak/">Red Hat build of Keycloak</a>, which offers <a href="https://access.redhat.com/support/policy/updates/red_hat_build_of_keycloak_notes">long term support</a> of specific versions of Keycloak.</p>
9696

9797
<h3>Coordinated Vulnerability Disclosure</h3>
9898
<p>To report a security vulnerability in the Keycloak codebase, send an email to <a href="mailto:[email protected]">[email protected]</a>. Please test against the <strong>latest version</strong> of Keycloak, include the affected version in your report, provide detailed instructions on how to reproduce the issue with a <a href="https://stackoverflow.com/help/minimal-reproducible-example">minimal and reproducible example</a>, and include your contact information for acknowledgements. If you are reporting known CVEs related to third-party libraries used in Keycloak, please <a href="https://github.com/keycloak/keycloak/issues/new/choose">create a new GitHub issue</a>.</p>
9999
<p>If you would like to collaborate on a fix for the security vulnerability, please include your GitHub username in the email, and we will provide you access to a temporary private fork where we can work together.</p>
100100
<p>If you discover any publicly disclosed security vulnerabilities, please notify us immediately through <a href="mailto:[email protected]">[email protected]</a>.</p>
101101

102+
<h3>Attribution Policy</h3>
103+
<p>We will credit reporters who informed us in private about security vulnerabilities in security advisories.</p>
104+
105+
<h3>Bug Bounty</h3>
106+
<p>We are currently offering a bug bounty program. It is both time- and budget restricted, and can change at any time.</p>
107+
<p>Security researchers who wish to participate in our dedicated vulnerability reward program should refer to <a href="https://yeswehack.com/programs/keycloak-bug-bounty-program">the Bug Bounty Program's platform</a> for submissions and details.</p>
108+
102109
<h2>Security Scanners</h2>
103110
<p>Reports from automated security scanners will <strong>not</strong> be accepted. These tools often report false positives, and can be disruptive to the project maintainers as it takes a long time to analyze these reports. If you believe you have found a security vulnerability using a security scanner, it is your responsibility to provide a clear example of the vulnerability and how it could be exploited specifically for Keycloak as outlined above.</p>
104111
</div>

sitemap-extra.xml

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

sitemap.xml

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)