Use the Vulnerability Disclosure issue template to report a new security vulnerability.
New security issue should follow these guidelines when being created on GitLab.com
:
-
Create new issues as
confidential
if unsure whether issue a potential vulnerability or not. It is easier to make an issue that should have been public open than to remediate an issue that should have been confidential. Consider adding the/confidential
quick action to a project issue template. -
Always label as
~security
at a minimum. If you're reporting a vulnerability (or something you suspect may possibly be one) please use the Vulnerability Disclosure template while creating the issue. Otherwise, follow the steps here (with a security label). -
Add any additional labels you know apply. Additional labels will be applied by the security team and other engineering personnel, but it will help with the triage process:
~"type::bug"
,~"type::maintenance"
, or~"type::feature"
if appropriate- Team or DevOps lifecycle labels
~customer
if issue is a result of a customer report~internal customer
should be added by team members when the issue impacts GitLab operations.~dependency update
if issue is related to updating to newer versions of the dependencies GitLab requires.~featureflag::
scoped labels if issue is for a functionality behind a feature flag
-
Issues that contain customer specific data, such as private repository contents, should be assigned
~keep confidential
. If possible avoid this by linking resources only available to GitLab team member, for example, the originating ZenDesk ticket. Label the link with(GitLab internal)
for clarity.
Occasionally, data that should remain confidential, such as the private project contents of a user that reported an issue, may get included in an issue. If necessary, a sanitized issue may need to be created with more general discussion and examples appropriate for public disclosure prior to release.
For review by the Application Security team, @ mention @gitlab-com/gl-security/appsec
.