Skip to content

Commit 7d5a1c6

Browse files
committed
Merge branch 'main' of github.com:mde/ejs into main
2 parents 551949d + 66f7471 commit 7d5a1c6

File tree

2 files changed

+25
-0
lines changed

2 files changed

+25
-0
lines changed

README.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,9 @@ for all the passed options. However, be aware that your code could break if we
5555
add an option with the same name as one of your data object's properties.
5656
Therefore, we do not recommend using this shortcut.
5757

58+
### Important
59+
You should never give end-users unfettered access to the EJS render method, If you do so you are using EJS in an inherently un-secure way.
60+
5861
### Options
5962

6063
- `cache` Compiled functions are cached, requires `filename`

SECURITY.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
# Security Policy
2+
This document outlines security procedures and general policies for the EJS template engine project
3+
4+
## Supported Versions
5+
6+
The current supported version.
7+
8+
| Version | Supported |
9+
| ------- | ------------------ |
10+
| 3.x.x | :white_check_mark: |
11+
12+
## Reporting a Vulnerability
13+
The EJS team and community take all security bugs in EJS seriously.
14+
We appreciate your efforts and responsible disclosure and will make every effort to acknowledge your contributions.
15+
16+
Report security bugs by emailing the lead maintainer in the Readme.md file.
17+
To ensure the timely response to your report, please ensure that the entirety of the report is contained within the email body and not solely behind a web link or an attachment.
18+
19+
The EJS team will then evaluate your report and will reply with the next steps in handling your report and may ask for additional information or guidance.
20+
21+
## out of scope vulnerabilities
22+
If you give end-users unfettered access to the EJS render method, you are using EJS in an inherently un-secure way. Please do not report security issues that stem from doing that. EJS is effectively a JavaScript runtime. Its entire job is to execute JavaScript. If you run the EJS render method without checking the inputs yourself, you are responsible for the results.

0 commit comments

Comments
 (0)