HoustonPutman commented on code in PR #80: URL: https://github.com/apache/solr-site/pull/80#discussion_r1010523257
########## content/pages/security.md: ########## @@ -7,6 +7,9 @@ template: security If you believe you have discovered a vulnerability in Solr, you may first want to consult the [list of known false positives](https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity#SolrSecurity-SolrandVulnerabilityScanningTools) to make sure you are reporting a real vulnerability. Then please disclose responsibly by following [these ASF guidelines](https://www.apache.org/security/) for reporting. +The Solr PMC will not accept the output of a vulnerability scan as a security report. +Please do not email the security list with issues on Solr dependencies or outputs from vulnerability scanning tools. Review Comment: Kevin messaged me and had similar concerns. I am of Jan's opinion that if its public, its public and attackers will probably not be waiting to hear something about it on the Solr users mailing list. I could be wrong though. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected] --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
