This document outlines security policy and procedures for the CrowdStrike MISP-tools
project.
- Supported Python versions
- Supported Operating Systems
- Supported MISP-tools versions
- Reporting a potential security vulnerability
- Disclosure and Mitigation Process
FalconPy functionality is unit tested to run under the following versions of Python. Unit testing is performed with every pull request or commit to main
.
Version | Supported |
---|---|
3.12.x | |
3.11.x | |
3.10.x | |
3.9.x | |
3.8.x | |
3.7.x | |
3.6.x | |
<= 3.5 | |
<= 2.x.x |
Unit testing for MISP-tools is performed using Apple macOS and Ubuntu Linux.
When discovered, we release security vulnerability patches for the most recent release at an accelerated cadence.
We have multiple avenues to receive security-related vulnerability reports.
Please report suspected security vulnerabilities by:
- Submitting a bug.
- Submitting a pull request to potentially resolve the issue.
- Sending an email to oss-security@crowdstrike.com.
Upon receiving a security bug report, the issue will be assigned to one of the project maintainers. This person will coordinate the related fix and release process, involving the following steps:
- Communicate with you to confirm we have received the report and provide you with a status update.
- You should receive this message within 48 - 72 business hours.
- Confirmation of the issue and a determination of affected versions.
- An audit of the codebase to find any potentially similar problems.
- Preparation of patches for all releases still under maintenance.
- These patches will be submitted as a separate pull request and contain a version update.
- This pull request will be flagged as a security fix.
- Once merged, and after post-merge unit testing has been completed, the patch will be immediately published to both PyPI repositories.