Skip to content

Security: CrowdStrike/MISP-tools

SECURITY.md

CrowdStrike Falcon

CrowdStrike Subreddit

Security Policy

This document outlines security policy and procedures for the CrowdStrike MISP-tools project.

Supported Python versions

FalconPy functionality is unit tested to run under the following versions of Python. Unit testing is performed with every pull request or commit to main.

Version Supported
3.12.x Yes
3.11.x Yes
3.10.x Yes
3.9.x Yes
3.8.x Yes
3.7.x Yes
3.6.x No
<= 3.5 No
<= 2.x.x No

Supported Operating Systems

Unit testing for MISP-tools is performed using Apple macOS and Ubuntu Linux.

Supported MISP-tools versions

When discovered, we release security vulnerability patches for the most recent release at an accelerated cadence.

Reporting a potential security vulnerability

We have multiple avenues to receive security-related vulnerability reports.

Please report suspected security vulnerabilities by:

Disclosure and mitigation process

Upon receiving a security bug report, the issue will be assigned to one of the project maintainers. This person will coordinate the related fix and release process, involving the following steps:

  • Communicate with you to confirm we have received the report and provide you with a status update.
    • You should receive this message within 48 - 72 business hours.
  • Confirmation of the issue and a determination of affected versions.
  • An audit of the codebase to find any potentially similar problems.
  • Preparation of patches for all releases still under maintenance.
    • These patches will be submitted as a separate pull request and contain a version update.
    • This pull request will be flagged as a security fix.
    • Once merged, and after post-merge unit testing has been completed, the patch will be immediately published to both PyPI repositories.




WE STOP BREACHES

There aren’t any published security advisories