@@ -5,8 +5,8 @@ Security policy
55:ref: `Python Security Response Team <psrt >` (PSRT) members balance this work against
66many other responsibilities. Please be thoughtful about the time and attention
77your report requires. Repeated failure to respect the security policy will
8- result in future reports being rejected or banned from the `` python ``
9- GitHub organization, regardless of technical merit.
8+ result in future reports being rejected, or the reporter being banned from the
9+ `` python `` GitHub organization, regardless of technical merit.
1010
1111What types of bugs are vulnerabilities?
1212---------------------------------------
@@ -39,7 +39,7 @@ malicious variation from this cannot be mitigated by Python itself.
3939
4040Vulnerabilities that affect availability (such as DoS, ReDoS, crashes,
4141dead-locks, and resource exhaustion) must be
42- triggerable with data inputs that are reasonably sized for the use- case.
42+ triggerable with data inputs that are reasonably sized for the use case.
4343Availability vulnerabilities must also demonstrate an "upward" change in posture
4444for the attacker, rather than a "lateral" one.
4545This is to avoid handling performance improvements as security vulnerabilities.
@@ -66,7 +66,7 @@ resolved on the ``main`` branch and only requires backporting.
6666Sometimes features may be marked as
6767"experimental" in Python, even in a stable Python version.
6868These features are not eligible for security vulnerabilities.
69- Instead open a public GitHub issue.
69+ Instead, open a public GitHub issue.
7070
7171If a vulnerability is platform-dependent, check if the platform is
7272supported per :pep: `11 `.
@@ -84,7 +84,7 @@ be formatted correctly:
8484 overly long, verbose, or excessive structure (such as headers or tables).
8585 Ideally reports should be a few sentences describing the vulnerability and
8686 a proof-of-concept script that reproduces the issue and provides a clear
87- indication whether the vulnerability is still present (such as exiting with
87+ indication of whether the vulnerability is still present (such as exiting with
8888 ``1 `` if vulnerable and ``0 `` if not vulnerable).
8989* When reporting large numbers or "batches" of vulnerabilities or
9090 searching for potential vulnerabilities using an LLM, you as a reporter must
@@ -120,8 +120,8 @@ not sure where to send your report, send an email to
120120Here's what to expect for how a vulnerability report will be handled:
121121
122122* Reporter reports the vulnerability privately to the PSRT.
123- * If the PSRT determines the report isn't a vulnerability, the issue
124- can be opened in the public issue tracker .
123+ * If the PSRT determines the report isn't a vulnerability, the reporter
124+ may open a public issue.
125125* If the PSRT determines the report is a vulnerability, the PSRT will
126126 accept the report and a CVE ID will be assigned by the PSF CNA.
127127* Once a public pull request containing a fix is merged to CPython,
0 commit comments