Skip to content

Conversation

@DavidLanz239
Copy link
Owner

@DavidLanz239 DavidLanz239 commented Dec 3, 2025

David Lanz te informa sobre su Política de Privacidad respecto del tratamiento y protección de los datos de carácter personal de los usuarios y clientes que puedan ser recabados por la navegación o contratación de servicios a través del sitio Web https://github.com/DavidLanz239.

En este sentido, el Titular garantiza el cumplimiento de la normativa vigente en materia de protección de datos personales, reflejada en la Ley Orgánica 3/2018, de 5 de diciembre, de Protección de Datos Personales y de Garantía de Derechos Digitales (LOPD GDD). Cumple también con el Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo de 27 de abril de 2016 relativo a la protección de las personas físicas (RGPD).

El uso de sitio Web implica la aceptación de esta Política de Privacidad así como las condiciones incluidas en el Aviso Legal.

Summary by Sourcery

Documentación:

  • Añade SECURITY.md describiendo las versiones compatibles para actualizaciones de seguridad e instrucciones para informar sobre vulnerabilidades.
Original summary in English

Summary by Sourcery

Documentation:

  • Add SECURITY.md describing supported versions for security updates and instructions for reporting vulnerabilities.

Add a security policy document outlining supported versions and vulnerability reporting.
@sourcery-ai
Copy link

sourcery-ai bot commented Dec 3, 2025

Guía del revisor

Añade un nuevo archivo SECURITY.md que describe las versiones compatibles y proporciona una sección de marcador de posición para informar vulnerabilidades.

Diagrama de flujo para determinar el estado de compatibilidad de versión a partir de SECURITY.md

flowchart TD
  A[Start] --> B[Identify_project_version]
  B --> C{Version_range?}
  C --> D[5.1.x]
  C --> E[5.0.x]
  C --> F[4.0.x]
  C --> G[< 4.0]

  D --> H[Supported]
  F --> H[Supported]
  E --> I[Not_supported]
  G --> I[Not_supported]

  H --> J[Follow_security_guidance_for_supported_versions]
  I --> K[Consider_upgrading_to_supported_version]
Loading

Cambios a nivel de archivo

Cambio Detalles Archivos
Introduce un documento SECURITY.md que define la política de soporte de seguridad y marcadores de posición para la notificación de vulnerabilidades.
  • Crear SECURITY.md con un encabezado de Política de seguridad y una estructura básica
  • Documentar las versiones compatibles en una tabla en Markdown indicando qué series reciben actualizaciones de seguridad
  • Añadir una sección de marcador de posición que describa cómo informar vulnerabilidades de seguridad, que se completará más adelante con detalles específicos del proyecto
SECURITY.md

Consejos y comandos

Interacción con Sourcery

  • Iniciar una nueva revisión: Comenta @sourcery-ai review en el pull request.
  • Continuar las discusiones: Responde directamente a los comentarios de revisión de Sourcery.
  • Generar una incidencia de GitHub a partir de un comentario de revisión: Pide a Sourcery que cree una
    incidencia a partir de un comentario de revisión respondiendo a dicho comentario. También puedes responder a un
    comentario de revisión con @sourcery-ai issue para crear una incidencia a partir de él.
  • Generar un título para el pull request: Escribe @sourcery-ai en cualquier parte del título
    del pull request para generar un título en cualquier momento. También puedes comentar
    @sourcery-ai title en el pull request para (re)generar el título en cualquier momento.
  • Generar un resumen del pull request: Escribe @sourcery-ai summary en cualquier parte
    del cuerpo del pull request para generar un resumen del PR en cualquier momento exactamente donde
    lo desees. También puedes comentar @sourcery-ai summary en el pull request para
    (re)generar el resumen en cualquier momento.
  • Generar la guía del revisor: Comenta @sourcery-ai guide en el pull
    request para (re)generar la guía del revisor en cualquier momento.
  • Resolver todos los comentarios de Sourcery: Comenta @sourcery-ai resolve en el
    pull request para resolver todos los comentarios de Sourcery. Útil si ya has
    atendido todos los comentarios y no quieres seguir viéndolos.
  • Descartar todas las revisiones de Sourcery: Comenta @sourcery-ai dismiss en el pull
    request para descartar todas las revisiones de Sourcery existentes. Especialmente útil si quieres
    empezar de cero con una nueva revisión; no olvides comentar
    @sourcery-ai review para iniciar una nueva revisión.

Personalizar tu experiencia

Accede a tu panel para:

  • Activar o desactivar funciones de revisión como el resumen del pull request
    generado por Sourcery, la guía del revisor y otras.
  • Cambiar el idioma de la revisión.
  • Añadir, eliminar o editar instrucciones de revisión personalizadas.
  • Ajustar otros parámetros de revisión.

Obtener ayuda

Original review guide in English

Reviewer's Guide

Adds a new SECURITY.md file describing supported versions and providing a placeholder section for reporting vulnerabilities.

Flow diagram for determining version support status from SECURITY.md

flowchart TD
  A[Start] --> B[Identify_project_version]
  B --> C{Version_range?}
  C --> D[5.1.x]
  C --> E[5.0.x]
  C --> F[4.0.x]
  C --> G[< 4.0]

  D --> H[Supported]
  F --> H[Supported]
  E --> I[Not_supported]
  G --> I[Not_supported]

  H --> J[Follow_security_guidance_for_supported_versions]
  I --> K[Consider_upgrading_to_supported_version]
Loading

File-Level Changes

Change Details Files
Introduce a SECURITY.md document defining security support policy and vulnerability reporting placeholders.
  • Create SECURITY.md with a Security Policy heading and basic structure
  • Document supported versions in a markdown table indicating which series receive security updates
  • Add a placeholder section describing how to report security vulnerabilities, to be filled in with project-specific details later
SECURITY.md

Tips and commands

Interacting with Sourcery

  • Trigger a new review: Comment @sourcery-ai review on the pull request.
  • Continue discussions: Reply directly to Sourcery's review comments.
  • Generate a GitHub issue from a review comment: Ask Sourcery to create an
    issue from a review comment by replying to it. You can also reply to a
    review comment with @sourcery-ai issue to create an issue from it.
  • Generate a pull request title: Write @sourcery-ai anywhere in the pull
    request title to generate a title at any time. You can also comment
    @sourcery-ai title on the pull request to (re-)generate the title at any time.
  • Generate a pull request summary: Write @sourcery-ai summary anywhere in
    the pull request body to generate a PR summary at any time exactly where you
    want it. You can also comment @sourcery-ai summary on the pull request to
    (re-)generate the summary at any time.
  • Generate reviewer's guide: Comment @sourcery-ai guide on the pull
    request to (re-)generate the reviewer's guide at any time.
  • Resolve all Sourcery comments: Comment @sourcery-ai resolve on the
    pull request to resolve all Sourcery comments. Useful if you've already
    addressed all the comments and don't want to see them anymore.
  • Dismiss all Sourcery reviews: Comment @sourcery-ai dismiss on the pull
    request to dismiss all existing Sourcery reviews. Especially useful if you
    want to start fresh with a new review - don't forget to comment
    @sourcery-ai review to trigger a new review!

Customizing Your Experience

Access your dashboard to:

  • Enable or disable review features such as the Sourcery-generated pull request
    summary, the reviewer's guide, and others.
  • Change the review language.
  • Add, remove or edit custom review instructions.
  • Adjust other review settings.

Getting Help

Copy link

@sourcery-ai sourcery-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey - he revisado tus cambios; aquí tienes algunos comentarios:

  • El archivo SECURITY.md todavía contiene texto de marcador de posición de la plantilla (por ejemplo, “Use this section to tell people…”); reemplázalo con información específica del proyecto sobre las versiones compatibles y la política de actualizaciones de seguridad.
  • En la sección “Reporting a Vulnerability”, añade detalles concretos sobre cómo informar (método de contacto, tiempos de respuesta esperados y proceso de divulgación) para que los usuarios sepan exactamente cómo proceder y qué esperar.
Prompt for AI Agents
Please address the comments from this code review:

## Overall Comments
- The `SECURITY.md` file still contains template placeholder text (e.g., “Use this section to tell people…”); replace these with project-specific information about supported versions and security update policy.
- Under “Reporting a Vulnerability”, add concrete reporting details (contact method, expected response times, and disclosure process) so users know exactly how to proceed and what to expect.

## Individual Comments

### Comment 1
<location> `SECURITY.md:17-21` </location>
<code_context>
+
+## Reporting a Vulnerability
+
+Use this section to tell people how to report a vulnerability.
+
+Tell them where to go, how often they can expect to get an update on a
+reported vulnerability, what to expect if the vulnerability is accepted or
+declined, etc.
</code_context>

<issue_to_address>
**🚨 suggestion (security):** Customize the vulnerability reporting section with concrete instructions.

This still reads like author-facing placeholder text. Please replace it with your actual reporting channel (security email, issue tracker, disclosure program), expected response timelines, and what reporters can expect during triage and resolution so the policy is directly usable.

Suggested implementation:

```
## Reporting a Vulnerability

If you believe you have found a security vulnerability in this project, please report it to us privately so we can investigate and fix the issue before it becomes public.

### How to Report

Please send a detailed report to:

- Email: `security@example.com`
- Subject line: `Security report: <short description>`

Your report should include (when possible):

- A description of the issue and the affected component(s) or endpoint(s)
- Steps to reproduce the issue (proof-of-concept code, requests, or configuration)
- Any relevant logs, screenshots, or impact assessment
- Your operating system, runtime, and version information
- Any known workarounds

If you believe the issue is especially sensitive (e.g., leads to immediate compromise of user data or infrastructure), please indicate this clearly in your report so we can prioritize it appropriately.

### Our Response Process

We aim to:

- Acknowledge receipt of your report within **3 business days**
- Provide an initial assessment or follow-up questions within **7 business days**
- Keep you informed of the triage status at least every **14 days** until resolution

During triage we will:

1. Validate the vulnerability and assess its impact and severity.
2. Determine the affected versions and whether a fix or mitigation is required.
3. Prepare patches, tests, and release notes as needed.

### Disclosure and Credit

Once a fix is available:

- We will coordinate a disclosure timeline with you, when possible.
- We will include a note in the release notes and/or security advisories describing the issue in general terms (impact, affected versions, mitigation).
- If you would like to be credited, we will acknowledge you as the reporter in the advisory and/or changelog (unless you prefer to remain anonymous).

Please do **not** open public issues for security vulnerabilities or share details in public channels until we have completed triage and released a fix.

```

You should replace `security@example.com` with your actual security contact address or reporting channel (for example, a real security mailbox, a private issue tracker link, or a disclosure program URL). If you use a specific SLA or different timelines, adjust the response and update cadence in the “Our Response Process” section accordingly so it reflects your real process.
</issue_to_address>

Sourcery is free for open source - if you like our reviews please consider sharing them ✨
¡Ayúdame a ser más útil! Haz clic en 👍 o 👎 en cada comentario y usaré tus respuestas para mejorar las revisiones.
Original comment in English

Hey there - I've reviewed your changes - here's some feedback:

  • The SECURITY.md file still contains template placeholder text (e.g., “Use this section to tell people…”); replace these with project-specific information about supported versions and security update policy.
  • Under “Reporting a Vulnerability”, add concrete reporting details (contact method, expected response times, and disclosure process) so users know exactly how to proceed and what to expect.
Prompt for AI Agents
Please address the comments from this code review:

## Overall Comments
- The `SECURITY.md` file still contains template placeholder text (e.g., “Use this section to tell people…”); replace these with project-specific information about supported versions and security update policy.
- Under “Reporting a Vulnerability”, add concrete reporting details (contact method, expected response times, and disclosure process) so users know exactly how to proceed and what to expect.

## Individual Comments

### Comment 1
<location> `SECURITY.md:17-21` </location>
<code_context>
+
+## Reporting a Vulnerability
+
+Use this section to tell people how to report a vulnerability.
+
+Tell them where to go, how often they can expect to get an update on a
+reported vulnerability, what to expect if the vulnerability is accepted or
+declined, etc.
</code_context>

<issue_to_address>
**🚨 suggestion (security):** Customize the vulnerability reporting section with concrete instructions.

This still reads like author-facing placeholder text. Please replace it with your actual reporting channel (security email, issue tracker, disclosure program), expected response timelines, and what reporters can expect during triage and resolution so the policy is directly usable.

Suggested implementation:

```
## Reporting a Vulnerability

If you believe you have found a security vulnerability in this project, please report it to us privately so we can investigate and fix the issue before it becomes public.

### How to Report

Please send a detailed report to:

- Email: `security@example.com`
- Subject line: `Security report: <short description>`

Your report should include (when possible):

- A description of the issue and the affected component(s) or endpoint(s)
- Steps to reproduce the issue (proof-of-concept code, requests, or configuration)
- Any relevant logs, screenshots, or impact assessment
- Your operating system, runtime, and version information
- Any known workarounds

If you believe the issue is especially sensitive (e.g., leads to immediate compromise of user data or infrastructure), please indicate this clearly in your report so we can prioritize it appropriately.

### Our Response Process

We aim to:

- Acknowledge receipt of your report within **3 business days**
- Provide an initial assessment or follow-up questions within **7 business days**
- Keep you informed of the triage status at least every **14 days** until resolution

During triage we will:

1. Validate the vulnerability and assess its impact and severity.
2. Determine the affected versions and whether a fix or mitigation is required.
3. Prepare patches, tests, and release notes as needed.

### Disclosure and Credit

Once a fix is available:

- We will coordinate a disclosure timeline with you, when possible.
- We will include a note in the release notes and/or security advisories describing the issue in general terms (impact, affected versions, mitigation).
- If you would like to be credited, we will acknowledge you as the reporter in the advisory and/or changelog (unless you prefer to remain anonymous).

Please do **not** open public issues for security vulnerabilities or share details in public channels until we have completed triage and released a fix.

```

You should replace `security@example.com` with your actual security contact address or reporting channel (for example, a real security mailbox, a private issue tracker link, or a disclosure program URL). If you use a specific SLA or different timelines, adjust the response and update cadence in the “Our Response Process” section accordingly so it reflects your real process.
</issue_to_address>

Sourcery is free for open source - if you like our reviews please consider sharing them ✨
Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.

Comment on lines +17 to +21
Use this section to tell people how to report a vulnerability.

Tell them where to go, how often they can expect to get an update on a
reported vulnerability, what to expect if the vulnerability is accepted or
declined, etc.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚨 suggestion (security): Customize the vulnerability reporting section with concrete instructions.

This still reads like author-facing placeholder text. Please replace it with your actual reporting channel (security email, issue tracker, disclosure program), expected response timelines, and what reporters can expect during triage and resolution so the policy is directly usable.

Suggested implementation:

## Reporting a Vulnerability

If you believe you have found a security vulnerability in this project, please report it to us privately so we can investigate and fix the issue before it becomes public.

### How to Report

Please send a detailed report to:

- Email: `security@example.com`
- Subject line: `Security report: <short description>`

Your report should include (when possible):

- A description of the issue and the affected component(s) or endpoint(s)
- Steps to reproduce the issue (proof-of-concept code, requests, or configuration)
- Any relevant logs, screenshots, or impact assessment
- Your operating system, runtime, and version information
- Any known workarounds

If you believe the issue is especially sensitive (e.g., leads to immediate compromise of user data or infrastructure), please indicate this clearly in your report so we can prioritize it appropriately.

### Our Response Process

We aim to:

- Acknowledge receipt of your report within **3 business days**
- Provide an initial assessment or follow-up questions within **7 business days**
- Keep you informed of the triage status at least every **14 days** until resolution

During triage we will:

1. Validate the vulnerability and assess its impact and severity.
2. Determine the affected versions and whether a fix or mitigation is required.
3. Prepare patches, tests, and release notes as needed.

### Disclosure and Credit

Once a fix is available:

- We will coordinate a disclosure timeline with you, when possible.
- We will include a note in the release notes and/or security advisories describing the issue in general terms (impact, affected versions, mitigation).
- If you would like to be credited, we will acknowledge you as the reporter in the advisory and/or changelog (unless you prefer to remain anonymous).

Please do **not** open public issues for security vulnerabilities or share details in public channels until we have completed triage and released a fix.

You should replace security@example.com with your actual security contact address or reporting channel (for example, a real security mailbox, a private issue tracker link, or a disclosure program URL). If you use a specific SLA or different timelines, adjust the response and update cadence in the “Our Response Process” section accordingly so it reflects your real process.

Original comment in English

🚨 suggestion (security): Customize the vulnerability reporting section with concrete instructions.

This still reads like author-facing placeholder text. Please replace it with your actual reporting channel (security email, issue tracker, disclosure program), expected response timelines, and what reporters can expect during triage and resolution so the policy is directly usable.

Suggested implementation:

## Reporting a Vulnerability

If you believe you have found a security vulnerability in this project, please report it to us privately so we can investigate and fix the issue before it becomes public.

### How to Report

Please send a detailed report to:

- Email: `security@example.com`
- Subject line: `Security report: <short description>`

Your report should include (when possible):

- A description of the issue and the affected component(s) or endpoint(s)
- Steps to reproduce the issue (proof-of-concept code, requests, or configuration)
- Any relevant logs, screenshots, or impact assessment
- Your operating system, runtime, and version information
- Any known workarounds

If you believe the issue is especially sensitive (e.g., leads to immediate compromise of user data or infrastructure), please indicate this clearly in your report so we can prioritize it appropriately.

### Our Response Process

We aim to:

- Acknowledge receipt of your report within **3 business days**
- Provide an initial assessment or follow-up questions within **7 business days**
- Keep you informed of the triage status at least every **14 days** until resolution

During triage we will:

1. Validate the vulnerability and assess its impact and severity.
2. Determine the affected versions and whether a fix or mitigation is required.
3. Prepare patches, tests, and release notes as needed.

### Disclosure and Credit

Once a fix is available:

- We will coordinate a disclosure timeline with you, when possible.
- We will include a note in the release notes and/or security advisories describing the issue in general terms (impact, affected versions, mitigation).
- If you would like to be credited, we will acknowledge you as the reporter in the advisory and/or changelog (unless you prefer to remain anonymous).

Please do **not** open public issues for security vulnerabilities or share details in public channels until we have completed triage and released a fix.

You should replace security@example.com with your actual security contact address or reporting channel (for example, a real security mailbox, a private issue tracker link, or a disclosure program URL). If you use a specific SLA or different timelines, adjust the response and update cadence in the “Our Response Process” section accordingly so it reflects your real process.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants