Thank you for helping keep ARC (Autonomous Robotics Carleton) and its documentation secure. This document describes how to report security vulnerabilities, what information to provide, our handling and disclosure process, and other guidelines for contributors and researchers.
If you discover a security issue in this repository or the systems described by its documentation, please report it privately to the maintainers so we can investigate and remediate it before public disclosure.
Preferred contact methods:
- Email:
devlead@arcarleton.mycses.ca - Alternatively, open a private issue and mark it
privateor use GitHub's secure vulnerability reporting flow.
When reporting, please include:
- A clear description of the vulnerability and its impact.
- Steps to reproduce (minimum viable reproduction preferred).
- Proof-of-concept (PoC) code or screenshots where applicable.
- The version/commit, environment, and any configuration needed to reproduce.
- Your suggested remediation (optional).
- How we can reach you for follow-up (email or GPG key).
Do not publicly disclose the vulnerability until it has been addressed by maintainers and coordinated disclosure is complete.
We aim to acknowledge receipt of a vulnerability report within 3 business days and provide an estimated timeline for remediation.
Our triage and remediation process:
- Triage — confirm the issue, classify severity, and determine scope.
- Investigation — reproduce and identify root cause.
- Remediation — implement and test a fix.
- Coordinated Disclosure — communicate with the reporter, release a patched version (or update docs), and publish an advisory.
- Credit — with the reporter's permission, we will credit researchers who responsibly disclose vulnerabilities.
- Critical — remote code execution, authentication bypass, or large-scale data exposure.
- High — privilege escalation, significant information disclosure, or broken access control.
- Medium — limited information disclosure, predictable errors that can be chained.
- Low — minor issues such as insecure headers, minor info leakage, or configuration best-practices.
This classification guides remediation priority but is not exhaustive — maintainers will determine final severity.
We prefer coordinated disclosure. Our default timeline (subject to change depending on complexity):
- Acknowledgement: within 3 business days.
- Initial triage and estimated timeline: within 7 calendar days.
- Patch or mitigation: typically within 90 days for non-critical issues; for critical issues we will prioritize faster fixes and may release emergency patches.
- Public advisory: after patch rollout or mutual agreement with the reporter.
If you need a different timeline (for example, to meet regulatory or disclosure requirements), please state it in your report.
We welcome security researchers and contributors acting in good faith. If you follow this policy and act responsibly (no undue disruption, no data exfiltration beyond what is required to demonstrate the issue), we will not pursue legal action against you for your research.
We ask that you:
- Avoid accessing or modifying private user data beyond what is necessary to demonstrate the issue.
- Avoid introducing persistent changes to production systems.
- Follow applicable laws and your local rules for security research.
If you want to encrypt your report:
- Provide a PGP key in your initial contact or request the maintainer's PGP key.
- Use standard encryption best practices and include your contact details so we can respond.
If emailing, include [SECURITY] in the subject line.
- Timely updates during triage and remediation.
- A CVE assignment where appropriate (we will request one if needed).
- An advisory and patched release (or a clear mitigation) once the issue is fixed.
- Optional recognition in our
SECURITY.mdorAUTHORS.mdwhen the reporter consents.
This policy applies to the 2026 repository and the documentation and scripts hosted within it.
Exclusions (out of scope):
- Third-party services and dependencies not maintained by the ARC project (report to the upstream maintainers or disclose per their policies).
- Issues affecting infrastructure outside the repository unless the documentation directly causes misuse.
If you’re unsure whether something is in scope, send us the report privately and we will triage it.
Maintainership and contact details should be kept up to date in the repo. Suggested canonical contact:
devlead@arcarleton.mycses.ca- GitHub: open a private security issue or use the repository's security advisories feature.
We appreciate the time and effort of security researchers who responsibly disclose issues. With permission, we will credit reporters in release notes or an acknowledgements section.
- 2025-09-18 — Initial security policy created for ARC Docs.
Last updated: 2025-09-18