Skip to content

Commit

Permalink
Start 2.0 submissions
Browse files Browse the repository at this point in the history
  • Loading branch information
virtualsteve-star committed May 17, 2024
1 parent 22b45c6 commit 6294f23
Show file tree
Hide file tree
Showing 2 changed files with 49 additions and 0 deletions.
15 changes: 15 additions & 0 deletions 2_0_candidates/_instructions.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
# Instructions for Using the Vulnerability Template

1. **Copy the Template:**
Start by making a copy of the `_template.md` file located in this directory.

2. **Populate the Template:**
Fill in the template with information about an important vulnerability that you have identified. Be as detailed and thorough as possible to ensure a clear understanding of the vulnerability.

3. **Save Your Work:**
Once you have populated the template, save your file with a name that follows the pattern: `YourName_VulnName.md`. This naming convention helps ensure uniqueness and reduce collisions.

4. **Upload Your File:**
Upload your completed vulnerability file back to this directory.

Feel free to create as many entries as you like for different proposed vulnerability types. Please keep each vulnerability type to its own file to facilitate later processing. Thank you for your contribution!
34 changes: 34 additions & 0 deletions 2_0_candidates/_template.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@


## Risk/Vuln Name

**Author(s):**

Name of the author(s) who have contributed to documenting this vulnerability.

### Description

A brief description of the risk that includes its potential effects such as system compromises, data breaches, or other security concerns.

### Common Examples of Risk

1. Example 1: Specific instance or type of this risk.
2. Example 2: Another instance or type of this risk.
3. Example 3: Yet another instance or type of this risk.

### Prevention and Mitigation Strategies

1. Prevention Step 1: A step or strategy that can be used to prevent the risk or mitigate its effects.
2. Prevention Step 2: Another prevention step or strategy.
3. Prevention Step 3: Yet another prevention step or strategy.

### Example Attack Scenarios

Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this risk, including the attacker's actions and the potential outcomes.

Scenario #2: Another example of an attack scenario showing a different way the risk could be exploited.

### Reference Links

1. [Link Title](URL): **Name of Outlet/Website/Whatever** (Arxiv papers should follow the citation guide posted with the article)
2. [Link Title](URL): **Name of Outlet/Website/Whatever** (Arxiv papers should follow the citation guide posted with the article)

0 comments on commit 6294f23

Please sign in to comment.