MethodicConfigurator

Security Policy

Security Requirements

This section outlines the security measures and requirements that the ArduPilot Methodic Configurator project implements to ensure the security and integrity of our software.

Dependency Management

We maintain secure software supply chains by keeping dependencies up-to-date:

Static Code Analysis

We use multiple static analysis tools to identify potential security issues and ensure code quality:

Automated Security Scanning

Our CI/CD pipeline includes automated security scans:

Compliance and Best Practices

We adhere to industry standards and best practices as documented in our Compliance Guide, including:

What Users Can Expect

Limitations

Supported Versions

Only the latest version is supported with security updates.

Reporting a Vulnerability

Select security on the top of the github homepage to report a vulnerability.

If we deem it relevant, we will try to fix it ASAP, or at least reply to you ASAP.

Response Process

Once a vulnerability is reported, we will acknowledge receipt within 3 business days and provide an estimated timeline for review and remediation.

Public Disclosure

We kindly request that you do not publicly disclose the vulnerability until we have had a reasonable opportunity to address it. We aim to resolve vulnerabilities promptly and appreciate your cooperation in maintaining the security of our users.

Responsible Disclosure

We encourage responsible disclosure of security vulnerabilities. Please provide detailed information about the vulnerability, including steps to reproduce it, affected components, and potential impact. This will help us to effectively address the issue.