This project is under active development, and we provide security updates for the latest version only. Please ensure you're using the latest version of the project to receive security updates.
Version
Supported
latest
:white_check_mark:
Security Architecture
For comprehensive information about the security architecture, threat model, and security controls implemented in EU Parliament Monitor, please refer to:
Security Architecture - Complete security implementation overview with C4 diagrams, threat model (STRIDE analysis), and compliance mapping
We take the security of the EU Parliament Monitor project seriously. If you have found a potential security vulnerability, we kindly ask you to report it privately, so that we can assess and address the issue before it becomes publicly known.
What Constitutes a Vulnerability
A vulnerability is a weakness or flaw in the project that can be exploited to compromise the security, integrity, or availability of the system or its data. Examples of vulnerabilities include, but are not limited to:
Cross-site scripting (XSS) attacks
HTML injection vulnerabilities
Insecure dependencies or supply chain attacks
Exposure of sensitive data
Insecure defaults or configurations
Insufficient input validation
Content Security Policy bypasses
How to Privately Report a Vulnerability using GitHub
Please follow these steps to privately report a security vulnerability:
Under the repository name, click Security. If you cannot see the "Security" tab, select the dropdown menu, and then click Security.
In the left sidebar, under "Reporting", click Advisories.
Click Report a vulnerability to open the advisory form.
Fill in the advisory details form. Provide as much information as possible to help us understand and reproduce the issue, including:
Description of the vulnerability
Steps to reproduce
Potential impact
Suggested mitigation (if known)
At the bottom of the form, click Submit report.
After you submit the report, the maintainers of the euparliamentmonitor repository will be notified. They will review the report, validate the vulnerability, and take necessary actions to address the issue. You will be added as a collaborator and credited for the security advisory.
Alternative Reporting Methods
If you prefer not to use GitHub's security advisory system, you can also report vulnerabilities via:
Third-party services (GitHub, European Parliament APIs)
Infrastructure (GitHub Pages hosting)
Client-side browser vulnerabilities (not controlled by this project)
Recognition and Anonymity
We appreciate your effort in helping us maintain a secure and reliable project. If your report results in a confirmed security fix, we will recognize your contribution in:
Release notes
Security advisory acknowledgment
Public GitHub recognition (unless you request to remain anonymous)
Contributors who help improve our security posture may also be considered for our Security Hall of Fame.
Thank you for helping us keep the EU Parliament Monitor project and its users safe. Your contributions to our security posture are greatly appreciated!