canmove, Confirmed users
639
edits
(Added the "analysis" section, minor reordering) |
m (→A Bug is Born) |
||
Line 2: | Line 2: | ||
Reports of security vulnerabilities come from many different sources. Many are directly filed as security bugs by various groups: | Reports of security vulnerabilities come from many different sources. Many are directly filed as security bugs by various groups: | ||
* Our security teams (e.g. fuzzing, security reviews and audits) | * Our security teams (e.g. fuzzing, static analysis, security reviews and audits) | ||
* External security researchers (including bounty hunters) | * External security researchers (including bounty hunters) | ||
* Engineers developing, reviewing, or testing notice vulnerabilities as they work on non-security bugs | * Engineers developing, reviewing, or testing notice vulnerabilities as they work on non-security bugs |