Skip to content

Add Incident Response Plan (IRP)#21

Merged
abhishek-anand merged 1 commit intomainfrom
add-incident-response-plan
Apr 14, 2026
Merged

Add Incident Response Plan (IRP)#21
abhishek-anand merged 1 commit intomainfrom
add-incident-response-plan

Conversation

@mkagenius
Copy link
Copy Markdown
Collaborator

Adds a concise Incident Response Plan covering:

  • Two disclosure strategies (Advisory With Patch / Advisory Early)
  • GHSA and CVE workflow integrated into phases
  • 90-day coordinated disclosure window
  • 5 clearly labeled phases with timelines for reporter visibility
  • Links back to SECURITY.md

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Copy link
Copy Markdown

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces a new Incident Response Plan (IRP) document detailing the five phases of security vulnerability management. The review feedback suggests shortening the containment timeline for critical vulnerabilities, using a dedicated security email address for reports, and addressing a broken link to a missing SECURITY.md file.

Comment thread INCIDENT_RESPONSE.md

## Phase 2 — Containment
_"We've identified the issue and are limiting its impact."_
**Target: 1–7 days after triage**
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

security-medium medium

For vulnerabilities classified as Critical (e.g., active exploitation), the containment target of 1–7 days is likely too long. It is recommended to aim for immediate containment (e.g., within 24 hours) for such high-stakes incidents to minimize impact.

Suggested change
**Target: 1–7 days after triage**
**Target: 1–7 days after triage (Immediate for Critical)**

Comment thread INCIDENT_RESPONSE.md

## Contact

Email: [hello@instavm.io](mailto:hello@instavm.io)
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

security-medium medium

Using a dedicated security email address (e.g., security@instavm.io) is a best practice for handling vulnerability reports. This ensures that sensitive security communications are routed to the correct team and handled with appropriate confidentiality.

Suggested change
Email: [hello@instavm.io](mailto:hello@instavm.io)
Email: [security@instavm.io](mailto:security@instavm.io)

Comment thread INCIDENT_RESPONSE.md

## Reporting a Vulnerability

See [SECURITY.md](SECURITY.md). **Do not open public issues.**
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

security-medium medium

The file SECURITY.md does not exist in the repository, making this a broken link. Please ensure that SECURITY.md is created to provide the necessary reporting instructions and policy details.

@abhishek-anand abhishek-anand merged commit f16002f into main Apr 14, 2026
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants