azure-cloud-architect (451-line SKILL.md, 3 scripts, 3 references): - 6-step workflow mirroring aws-solution-architect for Azure - Bicep/ARM templates, AKS, Functions, Cosmos DB, cost optimization - architecture_designer.py, cost_optimizer.py, bicep_generator.py security-pen-testing (850-line SKILL.md, 3 scripts, 3 references): - OWASP Top 10 systematic audit, offensive security testing - XSS/SQLi/SSRF/IDOR detection, secret scanning, API security - vulnerability_scanner.py, dependency_auditor.py, pentest_report_generator.py - Responsible disclosure workflow included terraform-patterns extended (487 → 740 lines): - Multi-cloud provider configuration - OpenTofu compatibility notes - Infracost integration for PR cost estimation - Import existing infrastructure patterns - Terragrunt DRY multi-environment patterns Updated engineering-team plugin.json (26 → 28 skills). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
11 KiB
Responsible Disclosure Guide
A complete guide for responsibly reporting security vulnerabilities found during authorized testing or independent security research.
Disclosure Timeline Templates
Standard 90-Day Disclosure
The industry-standard timeline used by Google Project Zero, CERT/CC, and most security researchers.
| Day | Action | Owner |
|---|---|---|
| 0 | Discover vulnerability, document with evidence | Researcher |
| 1 | Submit initial report to vendor security contact | Researcher |
| 3 | Confirm report received (if no auto-acknowledgment) | Researcher |
| 7 | Follow up if no acknowledgment received | Researcher |
| 7 | Acknowledge receipt, assign tracking ID | Vendor |
| 14 | Provide initial severity assessment and timeline | Vendor |
| 30 | First status update on remediation progress | Vendor |
| 30 | Request update if none provided | Researcher |
| 60 | Second status update; fix should be in development | Vendor |
| 60 | Offer technical assistance if fix is delayed | Researcher |
| 90 | Public disclosure deadline (with or without fix) | Researcher |
| 90+ | Coordinate joint disclosure statement if fix is ready | Both |
Accelerated 30-Day Disclosure
For actively exploited vulnerabilities or critical severity (CVSS 9.0+):
| Day | Action |
|---|---|
| 0 | Discover, document, report immediately |
| 1 | Vendor acknowledges |
| 7 | Vendor provides remediation timeline |
| 14 | Status update; patch expected |
| 30 | Public disclosure |
Extended 120-Day Disclosure
For complex vulnerabilities requiring architectural changes:
| Day | Action |
|---|---|
| 0 | Report submitted |
| 14 | Vendor acknowledges, confirms complexity |
| 30 | Vendor provides detailed remediation plan |
| 60 | Status update, partial fix may be deployed |
| 90 | Near-complete remediation expected |
| 120 | Full disclosure |
When to extend: Only if the vendor is actively working on a fix and communicating progress. A vendor that goes silent does not earn extra time.
Communication Templates
Initial Vulnerability Report
Subject: Security Vulnerability Report — [Brief Title]
To: security@[vendor].com
Dear Security Team,
I am writing to report a security vulnerability I discovered in [Product/Service Name].
## Summary
- **Vulnerability Type:** [e.g., SQL Injection, SSRF, Authentication Bypass]
- **Severity:** [Critical/High/Medium/Low] (CVSS: X.X)
- **Affected Component:** [e.g., /api/login endpoint, User Profile page]
- **Discovery Date:** [YYYY-MM-DD]
## Description
[Clear, technical description of the vulnerability — what it is, where it exists, and why it matters.]
## Steps to Reproduce
1. [Step 1]
2. [Step 2]
3. [Step 3]
## Evidence
[Screenshots, request/response pairs, or proof-of-concept code. Non-destructive only.]
## Impact
[What an attacker could achieve by exploiting this vulnerability.]
## Suggested Remediation
[Your recommendation for fixing the issue.]
## Disclosure Timeline
I follow a [90-day] responsible disclosure policy. I plan to publicly disclose this finding on [DATE] unless we agree on an alternative timeline.
## Researcher Information
- Name: [Your Name]
- Organization: [Your Organization, if applicable]
- Contact: [Your Email]
- PGP Key: [Fingerprint or link to public key]
I have not accessed any user data, modified any systems, or shared this information with anyone else. I am happy to provide additional details or assist with remediation.
Best regards,
[Your Name]
Follow-Up (No Response After 7 Days)
Subject: Re: Security Vulnerability Report — [Brief Title] (Follow-Up)
Dear Security Team,
I am following up on the security vulnerability report I submitted on [DATE] regarding [Brief Title].
I have not yet received an acknowledgment. Could you please confirm receipt and provide an estimated timeline for review?
For reference, my original report is included below / attached.
I remain available to provide additional details or clarification.
Best regards,
[Your Name]
Status Update Request (Day 30)
Subject: Re: Security Vulnerability Report — [Brief Title] (30-Day Update Request)
Dear Security Team,
It has been 30 days since I reported the [vulnerability type] in [component]. I would appreciate an update on:
1. Has the vulnerability been confirmed?
2. What is the remediation timeline?
3. Is there anything I can do to assist?
As noted in my original report, I follow a 90-day disclosure policy. The current disclosure date is [DATE].
Best regards,
[Your Name]
Pre-Disclosure Notification (Day 80)
Subject: Re: Security Vulnerability Report — [Brief Title] (Pre-Disclosure Notice)
Dear Security Team,
This is a courtesy notice that the 90-day disclosure window for [vulnerability] will close on [DATE].
Current status as I understand it: [summarize last known status].
If a fix is not yet available, I recommend:
- Publishing a security advisory acknowledging the issue
- Providing mitigation guidance to affected users
- Communicating a realistic remediation timeline
I am willing to:
- Extend the deadline by [X] days if you can provide a concrete remediation date
- Review the patch before public release
- Coordinate joint disclosure
Please respond by [DATE - 5 days] so we can align on the disclosure approach.
Best regards,
[Your Name]
Public Disclosure Statement
# Security Advisory: [Title]
**Reported:** [Date]
**Disclosed:** [Date]
**Vendor:** [Vendor Name]
**Status:** [Fixed in version X.Y.Z / Unpatched / Mitigated]
## Summary
[Brief description accessible to non-technical readers.]
## Technical Details
[Full technical description, reproduction steps, evidence.]
## Impact
[What could be exploited and the blast radius.]
## Timeline
| Date | Event |
|------|-------|
| [Date] | Vulnerability discovered |
| [Date] | Report submitted to vendor |
| [Date] | Vendor acknowledged |
| [Date] | Fix released (version X.Y.Z) |
| [Date] | Public disclosure |
## Remediation
[Steps users should take — update to version X, apply config change, etc.]
## Credit
Discovered by [Your Name] ([Organization]).
Legal Considerations
Before You Test
-
Written authorization is required. For external testing, obtain a signed rules-of-engagement document or scope-of-work. For bug bounty programs, the program's terms of service serve as authorization.
-
Understand local laws. The Computer Fraud and Abuse Act (CFAA) in the US, the Computer Misuse Act in the UK, and equivalent laws in other jurisdictions criminalize unauthorized access. Authorization is your legal shield.
-
Stay within scope. If the bug bounty program says "*.example.com only," do not test anything outside that scope. If your pen test contract covers the web application, do not pivot to internal networks.
-
Document everything. Keep timestamped records of all testing activities: what you tested, when, what you found, and what you did not do (e.g., "did not access real user data").
During Testing
-
Do not access real user data. Use your own test accounts. If you accidentally access real data, stop immediately, document the incident, and report it to the vendor.
-
Do not cause damage. No data destruction, no denial-of-service, no resource exhaustion. If a test might cause disruption, get explicit approval first.
-
Do not exfiltrate data. Demonstrate the vulnerability with minimal proof. A screenshot showing "1000 records returned" is sufficient — downloading the records is not.
-
Do not install backdoors. Even for "maintaining access during testing." If you need persistent access, work with the vendor's team.
During Disclosure
-
Do not threaten. Disclosure timelines are industry practice, not ultimatums. Communicate professionally.
-
Do not sell vulnerability details. Selling to exploit brokers instead of reporting to the vendor is irresponsible and may be illegal.
-
Give vendors reasonable time. 90 days is standard. Complex architectural fixes may need more time if the vendor is communicating and making progress.
-
Do not publicly disclose details that help attackers exploit unpatched systems. If the fix is not yet deployed, disclose the existence and severity of the issue without full exploitation details.
Bug Bounty Program Integration
Finding the Right Program
- Check the vendor's website: Look for
/security,/.well-known/security.txt, or a security page - Bug bounty platforms: HackerOne, Bugcrowd, Intigriti, YesWeHack
- No program? Report to
security@[vendor].comor use CERT/CC as an intermediary
Bug Bounty Best Practices
- Read the entire policy before testing — scope, exclusions, safe harbor
- Test only in-scope assets — out-of-scope findings may not be rewarded and could be legally risky
- Report one vulnerability per submission — do not bundle unrelated issues
- Provide clear reproduction steps — assume the reader cannot read your mind
- Do not duplicate — search existing reports before submitting
- Be patient — triage can take days to weeks depending on program volume
- Do not publicly disclose until the program explicitly permits it
If No Bug Bounty Exists
- Report directly to
security@[vendor].com - If no response after 14 days, try CERT/CC (https://www.kb.cert.org/vuls/report/)
- Follow the standard disclosure timeline
- Do not expect payment — responsible disclosure is an ethical practice, not a paid service
CVE Request Process
When to Request a CVE
- The vulnerability affects publicly available software
- The vendor has confirmed the issue
- A fix is available or will be available soon
How to Request
- Through the vendor: If the vendor is a CNA (CVE Numbering Authority), they will assign the CVE
- Through MITRE: If the vendor is not a CNA, submit a request at https://cveform.mitre.org/
- Through a CNA: Some platforms (HackerOne, GitHub) are CNAs and can assign CVEs for vulnerabilities in their scope
Information Required
- Vulnerability type (CWE ID if known)
- Affected product and version range
- Fixed version (if available)
- Attack vector (network, local, physical)
- Impact (confidentiality, integrity, availability)
- CVSS score and vector string
- Description (one paragraph, technical but readable)
- References (advisory URL, patch commit, bug report)
CVE ID Format
CVE-YYYY-NNNNN
Example: CVE-2024-12345
After assignment, the CVE will be published in the NVD (National Vulnerability Database) at https://nvd.nist.gov/.
Key Principles Summary
- Report first, disclose later. Always give the vendor a chance to fix the issue before going public.
- Minimize impact. Prove the vulnerability exists without causing damage or accessing real data.
- Communicate professionally. Security is stressful for everyone. Be clear, helpful, and patient.
- Document everything. Timestamps, evidence, communications — protect yourself and the process.
- Follow through. A report without follow-up helps no one. Stay engaged until the issue is resolved.
- Credit where due. Acknowledge the vendor's response (positive or negative) in your disclosure.
- Know the law. Authorization and scope are your legal foundations. Never test without them.