From harness-claude
Guides setting up vulnerability disclosure programs, responding to researcher reports, reporting third-party vulns, writing security advisories, requesting CVEs, and evaluating bug bounties.
npx claudepluginhub intense-visions/harness-engineering --plugin harness-claudeThis skill uses the workspace's default tool permissions.
> A vulnerability without a disclosure process is a vulnerability that gets sold to exploit
Manages vulnerability lifecycle: tracks CVEs, scores with CVSS, prioritizes risks using EPSS/KEV, designs remediation workflows, patch management, and disclosure practices.
Generates polished, human-sounding vulnerability disclosure reports for GHSA, HackerOne, and email. Auto-selects channel, calculates CVSS, adapts tone.
References 100 critical web vulnerabilities by category with definitions, root causes, impacts, and mitigations. Useful for web security audits, testing, and remediation.
Share bugs, ideas, or general feedback.
A vulnerability without a disclosure process is a vulnerability that gets sold to exploit brokers, dropped as a zero-day, or posted on Twitter -- coordinated disclosure turns discovered vulnerabilities into patches instead of breaches
The absence of a clear disclosure process creates perverse incentives that make vulnerabilities more dangerous, not less:
Establish a vulnerability disclosure program. Every organization that produces software should have a clear, public process for receiving vulnerability reports:
/.well-known/security.txt file on your web
domain. At minimum, include: Contact: (security email or web form URL), Expires:
(date when the file should be considered stale), Preferred-Languages:, and optionally
Encryption: (PGP key for encrypted reports) and Policy: (link to full disclosure
policy). This standardized file allows researchers to find your reporting channel quickly.security@yourdomain.com as the standard contact point.
Monitor it 24/7 or within a defined SLA. Configure PGP/GPG encryption so researchers
can submit reports confidentially.Follow the coordinated disclosure process. When you discover a vulnerability in someone else's product, or when a researcher reports one to you:
Request and manage CVE identifiers. CVEs (Common Vulnerabilities and Exposures) provide a standardized way to identify vulnerabilities:
Write effective security advisories. The advisory is the primary communication to users about the vulnerability and its fix:
Consider a bug bounty program for mature organizations. Bug bounties incentivize external security research with financial rewards:
The economics of disclosure: A researcher who discovers a zero-day has several options: report to the vendor (free or bug bounty reward), sell to an exploit broker ($10,000 to $2,500,000 depending on the target), use it for penetration testing engagements, or publish it for reputation. The vendor's response determines which option is most attractive. A vendor with no disclosure program, no acknowledgment, and no bounty makes the broker option more attractive. A vendor with a responsive program, fair bounties, and public credit makes responsible disclosure the rational choice.
PSIRT (Product Security Incident Response Team) operations: Large organizations establish a PSIRT to manage the vulnerability lifecycle: receive reports, triage, coordinate with engineering for fixes, manage CVE assignment, write advisories, coordinate disclosure timing, and track metrics (time to acknowledgment, time to fix, time to advisory). The PSIRT is the organization's interface with the external security research community. ISO/IEC 29147 (Vulnerability Disclosure) and ISO/IEC 30111 (Vulnerability Handling Processes) provide frameworks for PSIRT operations.
Legal landscape for security research: The Computer Fraud and Abuse Act (CFAA) in the US, the Computer Misuse Act in the UK, and similar laws in other jurisdictions can criminalize unauthorized access, even when performed with good intentions. Safe harbor language in disclosure policies provides a commitment not to pursue legal action. The DOJ's 2022 CFAA policy update states that good-faith security research should not be charged, but this is prosecutorial guidance, not law. The EU's proposed Cyber Resilience Act includes provisions for coordinated vulnerability disclosure. Organizations should consult legal counsel when drafting disclosure policies and safe harbor language.
Disclosure timeline negotiation: The 90-day standard is not rigid. If the vendor demonstrates active progress (regular status updates, a confirmed fix date within a reasonable window), researchers typically grant extensions. If the vendor is unresponsive or denies the vulnerability, researchers may shorten the timeline. If the vulnerability is being actively exploited in the wild (a zero-day), immediate disclosure may be warranted because users need to know to apply mitigations even before a patch exists. The goal is always to minimize the total exposure of users.
No disclosure policy. Researchers find a vulnerability but have no way to report it. There is no security.txt, no security@ email, and no contact information in the product's documentation. The researcher has three options: give up, disclose publicly (creating a zero-day), or sell to a broker. None of these options result in a coordinated patch. Publish a security.txt and a disclosure policy.
Threatening legal action against researchers. A researcher reports a vulnerability and the organization's legal department sends a cease-and-desist or threatens prosecution. This chills future reports -- other researchers see the threat and decide not to report. The vulnerability remains unfixed, but now the organization has also damaged its reputation in the security community. Include safe harbor language in the disclosure policy and honor it.
Disclosing without a patch available. Publishing a vulnerability advisory before a fix exists, giving attackers a roadmap without giving users a defense. Coordinate disclosure timing so that the patch and the advisory are released simultaneously. If a workaround exists, publish the workaround immediately and the full details after the patch.
Ignoring vulnerability reports. A researcher reports a critical vulnerability and receives no response for weeks or months. The researcher follows up, still no response. Eventually the researcher discloses publicly out of obligation to affected users. The organization is caught unprepared with no patch. Acknowledge reports within 48 hours even if the full assessment takes longer.
No CVE assignment. Fixing a vulnerability silently without assigning a CVE or publishing an advisory. Users who track vulnerabilities through CVEs and vulnerability databases do not know the fix exists and do not prioritize the update. Silent fixes leave users exposed because they do not know they need to update. Assign CVEs for all vulnerabilities in products used by others and publish advisories.