Skip to content

Commit 828cea1

Browse files
authored
Update SECURITY.md
1 parent 689ca02 commit 828cea1

File tree

1 file changed

+11
-1
lines changed

1 file changed

+11
-1
lines changed

SECURITY.md

+11-1
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,14 @@ To ensure the timely response to your report, please ensure that the entirety of
1919
The EJS team will then evaluate your report and will reply with the next steps in handling your report and may ask for additional information or guidance.
2020

2121
## Out-of-Scope Vulnerabilities
22-
If you give end-users unfettered access to the EJS render method, you are using EJS in an inherently un-secure way. Please do not report security issues that stem from doing that. EJS is effectively a JavaScript runtime. Its entire job is to execute JavaScript. If you run the EJS render method without checking the inputs yourself, you are responsible for the results.
22+
If you give end-users unfettered access to the EJS render method, you are using EJS in an inherently un-secure way. Please do not report security issues that stem from doing that.
23+
24+
EJS is effectively a JavaScript runtime. Its entire job is to execute JavaScript. If you run the EJS render method without checking the inputs yourself, you are responsible for the results.
25+
26+
In short, DO NOT send reports including this snippet of code:
27+
28+
```javascript
29+
app.get('/', (req, res) => {
30+
res.render('index', req.query);
31+
});
32+
```

0 commit comments

Comments
 (0)