Kancharoendee S.Phichitphanphong T.Jongyingyos C.Reid B.Kula R.G.Choetkiertikul M.Ragkhitwetsagul C.Sunetnanta T.Mahidol University2025-06-122025-06-122025-01-01Proceedings 2025 IEEE International Conference on Software Analysis Evolution and Reengineering Saner 2025 (2025) , 751-756https://repository.li.mahidol.ac.th/handle/123456789/110647Open-source projects are essential to software de-velopment, but publicly disclosing vulnerabilities without fixes increases the risk of exploitation. The Open Source Security Foundation (OpenS SF) addresses this issue by promoting robust security policies to enhance project security. Current research reveals that many projects perform poorly on OpenS SF criteria, indicating a need for stronger security practices and underscoring the value of SECURITY.md files for structured vulnerability re-porting. This study aims to provide recommendations for improving security policies. By examining 679 open-source projects, we find that email is still the main source of reporting. Furthermore, we find that projects without SECURITY.md files tend to be less secure (lower OpenSSF scores). Our analysis also indicates that, although many maintainers encourage private reporting methods, some contributors continue to disclose vulnerabilities publicly, bypassing established protocols. The results from this preliminary study pave the way for understanding how developers react and communicate a potential security threat. Future challenges include understanding the impact and effectiveness of these mechanisms and what factors may influence how the security threat is addressed.Computer ScienceEngineeringOn Categorizing Open Source Software Security Vulnerability Reporting Mechanisms on GitHubConference PaperSCOPUS10.1109/SANER64311.2025.000762-s2.0-105007294519