Uploaded image for project: 'WINDUP - Red Hat Application Migration Toolkit'
  1. WINDUP - Red Hat Application Migration Toolkit
  2. WINDUP-3696

Document the security practices for WindUp code

    XMLWordPrintable

Details

    • Feature Request
    • Resolution: Unresolved
    • Undefined
    • None
    • None
    • None
    • False
    • None
    • False
    • Hide
      * *Why we missed the bug?*
       ** Pick to proper answer from drop-down field upper.
       +_Additional comments:_+


       * *What is required:*
       ** Pick to proper answer from drop-down field upper.
       +_Additional comments:_+
      Show
      * *Why we missed the bug?*  ** Pick to proper answer from drop-down field upper.  +_Additional comments:_+  * *What is required:*  ** Pick to proper answer from drop-down field upper.  +_Additional comments:_+
    • 0
    • 0% 0%
    • ---
    • ---

    Description

      WindUp introspecting application's code, it can be quite sensitive for a few customers. It would be great if the security practices of WindUp itself were documented somewhere.

      For example, does the Red Hat Product Security team scans the Windup code base? How often? What about CVEs.?

      How does it impact the Z stream releases, the downstream product, the upstream, the container images.

      Attachments

        Activity

          People

            pcattana Philip Cattanach
            agoncal Antonio Goncalves (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

            Dates

              Created:
              Updated: