Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Proposal to remove the reward/gift aspect for vulnerabilities #5940

Merged
merged 1 commit into from
Jan 30, 2023

Conversation

Wadeck
Copy link
Contributor

@Wadeck Wadeck commented Jan 20, 2023

Context

  • In more than one year, I didn't send any gift for reported vulnerabilities. No reporters asked for that despite the "If we forget, feel free to remind us by posting a comment to the security issue you reported." message in https://www.jenkins.io/security/gift/#process.
  • The reward I sent for a previously reported issue took me a huge amount of time (especially administrative)
  • We often receive(d) out of scope reports (automatic script/scan) with payment request (like asking 100$ for a false positive)

Opinion

  • The credit aspect, to have a CVE with your name in the credits, is more important for researchers, especially when finding stuff in the open source
  • The budget (~40$) is not enough to be an effective incentive. But the presence of a bug bounty program create wrong expectations
  • The time spent "managing" this part does not seem to have a good return on investment

@daniel-beck WDYT?

@jenkins-infra/board Do you want to discuss the topic more broadly?

Copy link
Member

@NotMyFault NotMyFault left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

jenkins-infra/board Do you want to discuss the topic more broadly?

Fine with me to keep this conversation here on the PR, the impact is surveyable.

+1 for removing the gift policy, if there's no demand for it.

@oleg-nenashev
Copy link
Contributor

oleg-nenashev commented Jan 20, 2023 via email

Copy link
Contributor

@MarkEWaite MarkEWaite left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I like the change. Thanks very much!

@kmartens27
Copy link
Contributor

@daniel-beck with 3 board members approving, this will be merged to remove the gift text

@kmartens27 kmartens27 merged commit 21748a2 into jenkins-infra:master Jan 30, 2023
@@ -1,65 +0,0 @@
---
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Time to figure out how to purge the site?

https://www.jenkins.io/security/gift/

Even the search still indexes it…

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've ran curl -X PURGE https://www.jenkins.io/security/gift and a complete purge on Fastly but the page is still present 🤷

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It seems the page is still in the bucket:

curl -v -H "Host: www.jenkins.io"  https://www.origin.jenkins.io/security/gift/

I'll open an helpdesk issue to figure this out.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep, we only add, never delete.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep, we only add, never delete.

Do you happen to know the reason for that?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My guess (!) is that we just upload using the Azure CLI and never delete what's there.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants