Skip to content

Commit fd2557c

Browse files
committed
[skip ci] Add classification section to SECURITY.md
According to Volker, AI models respect this file when evaluating security issues. While we do link to php/policies:security-classification.rst, this clearly isn't enough to stop the frequent false-positive reports. I copied any relevant items from security-classification.rst, but also reworded the first one to something much more explicit.
1 parent c56f5ad commit fd2557c

1 file changed

Lines changed: 20 additions & 0 deletions

File tree

SECURITY.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,26 @@ Vulnerability reports remain private until published. When published, you will
1111
be credited as a contributor, and your contribution will reflect the MITRE
1212
Credit System.
1313

14+
# Classification
15+
16+
Issues commonly reported that are _not_ considered security issues include (but
17+
are not limited to):
18+
19+
- Invocation of specially crafted, malicious code intended to cause memory
20+
violations. This commonly includes malicious error handlers, destructors or
21+
`__toString()` functions. PHP does not offer sandboxing, and the execution of
22+
untrusted code is always considered unsafe.
23+
24+
- Passing malicious arguments to functions clearly not intended to receive
25+
unsanitized values, e.g. `mysqli_query()`. `escapeshellarg()` on the other
26+
hand should clearly be hardened against unsafe inputs.
27+
28+
- The use of legacy APIs or settings known to be insecure.
29+
30+
- The use of FFI.
31+
32+
- `open_basedir` or `disable_functions` bypasses.
33+
1434
# Vulnerability Policy
1535

1636
Our full policy is described at

0 commit comments

Comments
 (0)