On Categorizing Open Source Software Security Vulnerability Reporting Mechanisms on GitHub

dc.contributor.authorKancharoendee S.
dc.contributor.authorPhichitphanphong T.
dc.contributor.authorJongyingyos C.
dc.contributor.authorReid B.
dc.contributor.authorKula R.G.
dc.contributor.authorChoetkiertikul M.
dc.contributor.authorRagkhitwetsagul C.
dc.contributor.authorSunetnanta T.
dc.contributor.correspondenceKancharoendee S.
dc.contributor.otherMahidol University
dc.date.accessioned2025-06-12T18:16:46Z
dc.date.available2025-06-12T18:16:46Z
dc.date.issued2025-01-01
dc.description.abstractOpen-source projects are essential to software de-velopment, but publicly disclosing vulnerabilities without fixes increases the risk of exploitation. The Open Source Security Foundation (OpenS SF) addresses this issue by promoting robust security policies to enhance project security. Current research reveals that many projects perform poorly on OpenS SF criteria, indicating a need for stronger security practices and underscoring the value of SECURITY.md files for structured vulnerability re-porting. This study aims to provide recommendations for improving security policies. By examining 679 open-source projects, we find that email is still the main source of reporting. Furthermore, we find that projects without SECURITY.md files tend to be less secure (lower OpenSSF scores). Our analysis also indicates that, although many maintainers encourage private reporting methods, some contributors continue to disclose vulnerabilities publicly, bypassing established protocols. The results from this preliminary study pave the way for understanding how developers react and communicate a potential security threat. Future challenges include understanding the impact and effectiveness of these mechanisms and what factors may influence how the security threat is addressed.
dc.identifier.citationProceedings 2025 IEEE International Conference on Software Analysis Evolution and Reengineering Saner 2025 (2025) , 751-756
dc.identifier.doi10.1109/SANER64311.2025.00076
dc.identifier.scopus2-s2.0-105007294519
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/123456789/110647
dc.rights.holderSCOPUS
dc.subjectComputer Science
dc.subjectEngineering
dc.titleOn Categorizing Open Source Software Security Vulnerability Reporting Mechanisms on GitHub
dc.typeConference Paper
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=105007294519&origin=inward
oaire.citation.endPage756
oaire.citation.startPage751
oaire.citation.titleProceedings 2025 IEEE International Conference on Software Analysis Evolution and Reengineering Saner 2025
oairecerif.author.affiliationThe University of Osaka
oairecerif.author.affiliationNara Institute of Science and Technology
oairecerif.author.affiliationMahidol University

Files

Collections