Skip to content

Commit 0df318f

Browse files
pbolingCopilot
andauthored
Apply suggestion from @Copilot
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Signed-off-by: |7eter l-|. l3oling <peter.boling@gmail.com>
1 parent 92800a3 commit 0df318f

File tree

1 file changed

+9
-10
lines changed

1 file changed

+9
-10
lines changed

IRP.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,30 +2,29 @@
22

33
Status: Draft
44

5-
Purpose
6-
-------
5+
## Purpose
6+
77
This Incident Response Plan (IRP) defines the steps the project maintainer(s) will follow when handling security incidents related to the `oauth2` gem. It is written for a small project with a single primary maintainer and is intended to be practical, concise, and actionable.
88

9-
Scope
10-
-----
9+
## Scope
10+
1111
Applies to security incidents that affect the `oauth2` codebase, releases (gems), CI/CD infrastructure related to building and publishing the gem, repository credentials, or any compromise of project infrastructure that could impact users.
1212

13-
Key assumptions
13+
## Key assumptions
1414
- This project is maintained primarily by a single maintainer.
1515
- Public vulnerability disclosure is handled via Tidelift (see `SECURITY.md`).
1616
- The maintainer will act as incident commander unless otherwise delegated.
1717

18-
Contact & Roles
19-
---------------
18+
## Contact & Roles
19+
2020
- Incident Commander: Primary maintainer (repo owner). Responsible for coordinating triage, remediation, and communications.
2121
- Secondary Contact: (optional) A trusted collaborator or organization contact if available.
2222

23-
If you are an external reporter
23+
### If you are an external reporter
2424
- Do not publicly disclose details of an active vulnerability before coordination via Tidelift.
2525
- See `SECURITY.md` for Tidelift disclosure instructions. If the reporter has questions and cannot use Tidelift, they may open a direct encrypted report as described in `SECURITY.md` (if available) or email the maintainer contact listed in the repository.
2626

27-
Incident Handling Workflow (high level)
28-
---------------------------------------
27+
## Incident Handling Workflow (high level)
2928
1. Identification & Reporting
3029
- Reports may arrive via Tidelift, issue tracker, direct email, or third-party advisories.
3130
- Immediately acknowledge receipt (within 24-72 hours) via the reporting channel.

0 commit comments

Comments
 (0)