提交 7949ce90 编写于 作者: A Annie_wang

update docs

Signed-off-by: NAnnie_wang <annie.wangli@huawei.com>
上级 dd7d6f24
......@@ -27,7 +27,7 @@ The OpenHarmony community has multiple channels to collect security vulnerabilit
## Assessing Security Vulnerabilities
The OpenHarmony Security Issue Response Team organizes maintainers to verify the security vulnerabilities reported. The OpenHarmony community assesses security vulnerabilities based on the mainstream [CVSS] (https://www.first.org/cvss/calculator/3.1). The table below lists the severity levels and scores of the CVSS.
The OpenHarmony Security Issue Response Team organizes maintainers to verify the security vulnerabilities reported. The OpenHarmony community assesses security vulnerabilities based on the mainstream [CVSS](https://www.first.org/cvss/calculator/3.1). The table below lists the severity levels and scores of the CVSS.
|Severity Rating|Score|
|--------------------------|-----------------|
......
......@@ -7,7 +7,7 @@ The OpenHarmony community attaches great importance to the security of community
## Program Scope
|Category|Description|
|--------|-------------------|
|Software version|OpenHarmony V3.1 LTS|
|Software Version|OpenHarmony V3.1 LTS|
|Code repository|Bundle management:<br>https://gitee.com/openharmony/appexecfwk_standard<br>Distributed scheduler:<br>https://gitee.com/openharmony/distributedschedule_dms_fwk_lite<br>https://gitee.com/openharmony/distributedschedule_dms_fwk<br>Startup:<br>https://gitee.com/openharmony/startup_init_lite<br>https://gitee.com/openharmony/startup_appspawn<br>https://gitee.com/openharmony/startup_syspara_lite|
## Security Vulnerability Scoring Criteria
......@@ -21,7 +21,7 @@ The Common Vulnerability Scoring System (CVSS) is used to rate and score the vul
|Medium|4.0-6.9|
|Low|0.1-3.9|
[VCSS calculator](https://www.first.org/cvss/calculator/3.1)
[CVSS calculator](https://www.first.org/cvss/calculator/3.1)
## Bounty Program
......@@ -73,7 +73,9 @@ The vulnerabilities that are not eligible for reward include but are not limited
## **Forbidden Behaviors During Testing**
- Do not access, download, modify, or delete data that does not belong to you without permission. Only PoC is allowed to prove the existence of the vulnerability.
- Phishing or social engineering attacks are prohibited.
- Do not use security vulnerabilities and related information for any illegal purpose. The following activities are prohibited:
- Access the computer information network or using resources in the computer information network without permission.
- Delete, modify, or add the functions of the computer information network without permission.
......@@ -82,7 +84,7 @@ The vulnerabilities that are not eligible for reward include but are not limited
- Access the computer information network to obtain data stored in related website systems and platforms without permission.
- Other behaviors that jeopardize the security of computer information networks.
You should assume all compensation liabilities for any loss caused to OpenHarmony due to the above behavior. If your behavior violates laws and regulations, you should bear the corresponding legal consequences.
You should assume all compensation liabilities for any loss caused to OpenHarmony due to the above behavior. If your behavior violates laws and regulations, you should bear the corresponding legal consequences.
## Participant Restriction
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册