Skip to content

docs(security): update vulnerability reporting policy and admin trust boundary#38653

Open
sha174n wants to merge 1 commit intoapache:masterfrom
sha174n:docs/update-security-reporting-policy
Open

docs(security): update vulnerability reporting policy and admin trust boundary#38653
sha174n wants to merge 1 commit intoapache:masterfrom
sha174n:docs/update-security-reporting-policy

Conversation

@sha174n
Copy link
Contributor

@sha174n sha174n commented Mar 14, 2026

User description

SUMMARY

Expands and clarifies Apache Superset's security reporting documentation across two files:

  • .github/SECURITY.md

    • Added submission standards: plain-text format requirement, mandatory AI/LLM disclosure, and human-verified PoC requirement
    • Defined explicit out-of-scope categories (Admin-only attack vectors, brute force/DoS, theoretical/unverified findings)
    • Added CVE aggregation policy based on MITRE CNA Operational Rules 4.1.10, 4.1.11, and 4.2.13
    • Clarified outcome handling: borderline reports may be converted to public GitHub issues for community hardening
  • docs/admin_docs/security/security.mdx

    • Added a threat model section under the Admin role explaining that Admin is a fully trusted operational boundary
    • Clarified that actions taken with Admin privileges are intended capabilities, not vulnerabilities, and are ineligible for CVE assignment per MITRE CNA Rule 4.1

BEFORE/AFTER SCREENSHOTS OR ANIMATED GIF

TESTING INSTRUCTIONS

ADDITIONAL INFORMATION

  • Has associated issue:
  • Required feature flags:
  • Changes UI
  • Includes DB Migration (follow approval process in SIP-59)
    • Migration is atomic, supports rollback & is backwards-compatible
    • Confirm DB migration upgrade and downgrade tested
    • Runtime estimates and downtime expectations provided
  • Introduces new feature or API
  • Removes existing feature or API

CodeAnt-AI Description

Clarify security reporting rules, CVE aggregation, and Admin threat model

What Changed

  • Reports must be submitted as plain text, disclose any AI/LLM usage, and include a human-verified, manual proof-of-concept on a supported release; unverified AI outputs or scanner logs will be closed.
  • The security doc now lists information to include (version/commit, sanitized config, environment, impacted component, expected vs actual behavior, reproduction steps).
  • Explicitly marks certain findings out-of-scope for CVE: issues requiring Admin privileges, brute-force/DoS/rate-limiting reports, theoretical/unreproducible attack paths, and non-exploitable informational issues.
  • Defines CVE aggregation rules: group related exploit vectors stemming from the same root cause into a single CVE; separate CVEs only for independently fixable modules.
  • Clarifies that out-of-scope but useful hardening items may be converted into public GitHub issues for community attention.
  • Adds an Admin threat-model note: Admin is a trusted operational boundary, so actions that require Admin privileges are treated as intended capabilities and are ineligible for CVE assignment.

Impact

✅ Clearer vulnerability submission requirements
✅ Fewer invalid CVE reports requiring triage
✅ Clearer guidance on Admin-scoped findings

💡 Usage Guide

Checking Your Pull Request

Every time you make a pull request, our system automatically looks through it. We check for security issues, mistakes in how you're setting up your infrastructure, and common code problems. We do this to make sure your changes are solid and won't cause any trouble later.

Talking to CodeAnt AI

Got a question or need a hand with something in your pull request? You can easily get in touch with CodeAnt AI right here. Just type the following in a comment on your pull request, and replace "Your question here" with whatever you want to ask:

@codeant-ai ask: Your question here

This lets you have a chat with CodeAnt AI about your pull request, making it easier to understand and improve your code.

Example

@codeant-ai ask: Can you suggest a safer alternative to storing this secret?

Preserve Org Learnings with CodeAnt

You can record team preferences so CodeAnt AI applies them in future reviews. Reply directly to the specific CodeAnt AI suggestion (in the same thread) and replace "Your feedback here" with your input:

@codeant-ai: Your feedback here

This helps CodeAnt AI learn and adapt to your team's coding style and standards.

Example

@codeant-ai: Do not flag unused imports.

Retrigger review

Ask CodeAnt AI to review the PR again, by typing:

@codeant-ai: review

Check Your Repository Health

To analyze the health of your code repository, visit our dashboard at https://app.codeant.ai. This tool helps you identify potential issues and areas for improvement in your codebase, ensuring your repository maintains high standards of code health.

… boundary

- Expand SECURITY.md with submission standards, AI disclosure requirement,
  human-verified PoC policy, out-of-scope definitions, CVE aggregation rules,
  and outcome handling for borderline reports
- Add threat model section to security.mdx clarifying the Admin role as a
  trusted boundary and its implications for CVE eligibility

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
@bito-code-review
Copy link
Contributor

bito-code-review bot commented Mar 14, 2026

Code Review Agent Run #f9c42f

Actionable Suggestions - 0
Review Details
  • Files reviewed - 1 · Commit Range: 5153f64..5153f64
    • docs/admin_docs/security/security.mdx
  • Files skipped - 1
    • .github/SECURITY.md - Reason: Filter setting
  • Tools
    • Whispers (Secret Scanner) - ✔︎ Successful
    • Detect-secrets (Secret Scanner) - ✔︎ Successful

Bito Usage Guide

Commands

Type the following command in the pull request comment and save the comment.

  • /review - Manually triggers a full AI review.

  • /pause - Pauses automatic reviews on this pull request.

  • /resume - Resumes automatic reviews.

  • /resolve - Marks all Bito-posted review comments as resolved.

  • /abort - Cancels all in-progress reviews.

Refer to the documentation for additional commands.

Configuration

This repository uses Superset You can customize the agent settings here or contact your Bito workspace admin at evan@preset.io.

Documentation & Help

AI Code Review powered by Bito Logo

@github-actions github-actions bot added the doc Namespace | Anything related to documentation label Mar 14, 2026
@codeant-ai-for-open-source codeant-ai-for-open-source bot added the size:M This PR changes 30-99 lines, ignoring generated files label Mar 14, 2026
@codeant-ai-for-open-source
Copy link
Contributor

Sequence Diagram

This PR clarifies how Superset security reports are submitted and triaged. The flow emphasizes required report quality, excludes Admin-only vectors from CVE scope, and aggregates related findings by shared root cause before final disposition.

sequenceDiagram
    participant Reporter
    participant SecurityTeam
    participant PublicIssueTracker

    Reporter->>SecurityTeam: Submit plain text report with AI disclosure and verified PoC
    SecurityTeam->>SecurityTeam: Validate submission standards
    SecurityTeam->>SecurityTeam: Evaluate scope against security policy boundary

    alt Requires Admin privileges or otherwise out of scope
        SecurityTeam->>PublicIssueTracker: Convert to public hardening issue when useful
        SecurityTeam-->>Reporter: Close as not CVE eligible
    else In scope vulnerability
        SecurityTeam->>SecurityTeam: Aggregate related vectors by shared root cause
        SecurityTeam-->>Reporter: Proceed with CVE triage outcome
    end
Loading

Generated by CodeAnt AI

@netlify
Copy link

netlify bot commented Mar 14, 2026

Deploy Preview for superset-docs-preview ready!

Name Link
🔨 Latest commit 5153f64
🔍 Latest deploy log https://app.netlify.com/projects/superset-docs-preview/deploys/69b5b79198e2ab000803c6d8
😎 Deploy Preview https://deploy-preview-38653--superset-docs-preview.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

doc Namespace | Anything related to documentation size/M size:M This PR changes 30-99 lines, ignoring generated files

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant