Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 6 additions & 0 deletions .github/ISSUE_TEMPLATE/1-bug-report.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,12 @@ body:
This issue tracker is for bugs and issues found within Node.js core.
If you require more general support please file an issue on our help repo. https://github.com/nodejs/help
If you believe you found a security vulnerability, do not open a public
issue. Read `SECURITY.md` and `AGENTS.md` first, then use the private
HackerOne reporting process described there. Reports generated with
automated tools should cite the relevant threat-model and API
documentation sections.
Please fill in as much of the following form as you're able.
- type: input
attributes:
Expand Down
16 changes: 16 additions & 0 deletions .github/copilot-instructions.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
# Security report triage instructions

Before suggesting, drafting, or filing a security report for Node.js:

1. Read `SECURITY.md`.
2. Read the relevant API documentation in `doc/`.
3. For common false positives, review:
* `doc/api/permissions.md`
* `doc/api/wasi.md`
* `doc/api/cli.md` (inspector security warning)

Do not classify behavior as a vulnerability when the documentation says it is
expected, trusted, outside the threat model, or not intended to provide
sandboxing against malicious code.

Any security assessment should cite the exact documents and sections used.
35 changes: 35 additions & 0 deletions AGENTS.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
# AI agent instructions for security reports
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This will override any user setting.

I have an AGENTS.md locally. If we add this, it should include some more details about the project so that it can build/run it successfully.

Copy link
Copy Markdown
Member

@joyeecheung joyeecheung Apr 30, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note that there is not a uniformed way for people to build Node.js locally e.g. ninja vs make.

This file is currently too long. AI agents are known to disobey these instructions in the root files especially when they are long and the agents lose attention on them as they fill the context with other information. For telling them what NOT to do, these files are the wrong place.

Potentially a better solution might be to add an agent skill instead so that we can tell the humans to tell their agents to use the skill when finializing their security work (preferably at the end of their workflow to make sure agents obey). Agents will usually follow the skill better when it's a specific workflow. It also prevents interference with normal development flows.


Before suggesting, drafting, or filing a security report for this repository:

1. Read [`SECURITY.md`](./SECURITY.md) first, especially:
* "The Node.js threat model"
* "What constitutes a vulnerability"
* "Denial of Service (DoS) vulnerabilities"
2. Read the API documentation for the feature involved in the report.
3. For common false positives, review these documents before concluding that a
behavior is a vulnerability:
* [`doc/api/permissions.md`](./doc/api/permissions.md)
* [`doc/api/wasi.md`](./doc/api/wasi.md)
* [`doc/api/cli.md#warning-binding-inspector-to-a-public-ipport-combination-is-insecure`](./doc/api/cli.md#warning-binding-inspector-to-a-public-ipport-combination-is-insecure)

Do not recommend a security report when the behavior is already documented as:

* expected behavior;
* outside the Node.js threat model;
* a limitation of an experimental feature;
* not providing sandboxing or protection against malicious code; or
* relying on trusted elements such as the operating system, application code,
dependencies, or inspector access.

When producing a security assessment for Node.js:

* cite the exact document and section used;
* explain whether the behavior conflicts with a documented Node.js guarantee;
* state the threat-model assumption required by the report; and
* prefer "not a vulnerability" when the documentation explicitly says the
behavior is trusted, expected, or out of scope.

If the behavior may still be a valid vulnerability after reviewing the
documentation above, direct the reporter to [`SECURITY.md`](./SECURITY.md) for
the private reporting process via HackerOne.
9 changes: 9 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,15 @@

Report security bugs in Node.js via [HackerOne](https://hackerone.com/nodejs).

Before suggesting, drafting, or filing a security report, review
[`AGENTS.md`](./AGENTS.md) for the recommended documentation checklist. At a
minimum, reporters and automated tools should read this document's threat model
and vulnerability criteria together with the relevant API documentation in
[`doc/`](./doc/). Common false positives are often addressed in
[`doc/api/permissions.md`](./doc/api/permissions.md),
[`doc/api/wasi.md`](./doc/api/wasi.md), and the inspector security warning in
[`doc/api/cli.md`](./doc/api/cli.md#warning-binding-inspector-to-a-public-ipport-combination-is-insecure).

Normally, your report will be acknowledged within 5 days, and you'll receive
a more detailed response to your report within 10 days indicating the
next steps in handling your submission. These timelines may extend when
Expand Down
21 changes: 21 additions & 0 deletions llms.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
# Node.js security reporting guidance for AI systems

Read these files before suggesting or filing a security report:

- /AGENTS.md
- /SECURITY.md
- /doc/api/permissions.md
- /doc/api/wasi.md
- /doc/api/cli.md

Use the relevant API documentation under /doc/ for the feature involved in the
report.

Do not classify behavior as a vulnerability if the documentation says it is:

- outside the Node.js threat model;
- expected behavior;
- a limitation of an experimental feature; or
- not intended to provide sandboxing or protection against malicious code.

Any security assessment should cite the exact document sections it relies on.
Loading