Skip to content

Commit 9c25cab

Browse files
Apply suggestions from code review
Co-authored-by: Savannah Ostrowski <savannah@python.org>
1 parent b29e108 commit 9c25cab

1 file changed

Lines changed: 7 additions & 7 deletions

File tree

security/policy.rst

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ Security policy
55
:ref:`Python Security Response Team <psrt>` (PSRT) members balance this work against
66
many other responsibilities. Please be thoughtful about the time and attention
77
your report requires. Repeated failure to respect the security policy will
8-
result in future reports being rejected or banned from the ``python``
9-
GitHub organization, regardless of technical merit.
8+
result in future reports being rejected, or the reporter being banned from the
9+
``python`` GitHub organization, regardless of technical merit.
1010

1111
What types of bugs are vulnerabilities?
1212
---------------------------------------
@@ -39,7 +39,7 @@ malicious variation from this cannot be mitigated by Python itself.
3939

4040
Vulnerabilities that affect availability (such as DoS, ReDoS, crashes,
4141
dead-locks, and resource exhaustion) must be
42-
triggerable with data inputs that are reasonably sized for the use-case.
42+
triggerable with data inputs that are reasonably sized for the use case.
4343
Availability vulnerabilities must also demonstrate an "upward" change in posture
4444
for the attacker, rather than a "lateral" one.
4545
This is to avoid handling performance improvements as security vulnerabilities.
@@ -66,7 +66,7 @@ resolved on the ``main`` branch and only requires backporting.
6666
Sometimes features may be marked as
6767
"experimental" in Python, even in a stable Python version.
6868
These features are not eligible for security vulnerabilities.
69-
Instead open a public GitHub issue.
69+
Instead, open a public GitHub issue.
7070

7171
If a vulnerability is platform-dependent, check if the platform is
7272
supported per :pep:`11`.
@@ -84,7 +84,7 @@ be formatted correctly:
8484
overly long, verbose, or excessive structure (such as headers or tables).
8585
Ideally reports should be a few sentences describing the vulnerability and
8686
a proof-of-concept script that reproduces the issue and provides a clear
87-
indication whether the vulnerability is still present (such as exiting with
87+
indication of whether the vulnerability is still present (such as exiting with
8888
``1`` if vulnerable and ``0`` if not vulnerable).
8989
* When reporting large numbers or "batches" of vulnerabilities or
9090
searching for potential vulnerabilities using an LLM, you as a reporter must
@@ -120,8 +120,8 @@ not sure where to send your report, send an email to
120120
Here's what to expect for how a vulnerability report will be handled:
121121

122122
* Reporter reports the vulnerability privately to the PSRT.
123-
* If the PSRT determines the report isn't a vulnerability, the issue
124-
can be opened in the public issue tracker.
123+
* If the PSRT determines the report isn't a vulnerability, the reporter
124+
may open a public issue.
125125
* If the PSRT determines the report is a vulnerability, the PSRT will
126126
accept the report and a CVE ID will be assigned by the PSF CNA.
127127
* Once a public pull request containing a fix is merged to CPython,

0 commit comments

Comments
 (0)