# Security Policy ## Reporting a Vulnerability ### Types of Security Issues We actively monitor: - Code vulnerabilities (RCE, XSS, authentication bypass) - Dependency risks (critical vulnerabilities in project dependencies, such as requirements.txt, pyproject.toml, or equivalent files) - Configuration flaws (insecure defaults in deployment scripts) ### Disclosure Channels (Choose one): 1. **Encrypted Email** Contact: `wangfeng19950315@163.com` *Subject format: `[SECURITY] ModuleName - Brief Description`* 2. **GitHub Private Report** Use GitHub's ["Report a vulnerability"](https://github.com/Megvii-BaseDetection/YOLOX/security/advisories) feature 3. **Reporting Security Issues** Please report security issues using Create new issue: https://github.com/Megvii-BaseDetection/YOLOX/issues/new ## Response Process 1. **Acknowledgement** - Initial response within **48 business hours** 2. **Assessment** - Triage using CVSS v3.1 scoring 3. **Remediation** - Critical (CVSS ≥9.0): Patch within **7 days** - High (CVSS 7-8.9): Patch within **30 days** 4. **Public Disclosure** - Published via [GitHub Advisories](https://github.com/Megvii-BaseDetection/YOLOX/security/advisories) - CVE assignment coordinated with [MITRE](https://cveform.mitre.org) ## Secure Development Practices - Always verify hashes when downloading dependencies: ```bash sha256sum -c ```