Skip to content

Commit

Permalink
Copyediting security vulnerabilities section
Browse files Browse the repository at this point in the history
  • Loading branch information
bohnertchris committed Jun 11, 2024
1 parent 8007e68 commit cff1cc8
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -115,11 +115,11 @@ Setup your local development environment for [AEM as a Cloud Service SDK](https:

### Security Vulnerabilities

The aem-project-archetype is not a product, such as if we update the archetype to address security vulnerabilities it will automatically propagate to all the projects created using it. The archetype is rather a template customers use to start a project from, essentially copy & pasting code and running some post-processing scripts.
The aem-project-archetype is not considered part of the core AEM product, in that if Adobe updates the archetype to address security vulnerabilities it will not automatically propagate to all the projects created using it. The archetype is rather a template you can use to start a project, essentially copying ans pasting code and running some post-processing scripts.

Users of the archetype are responsible to update the build-time dependencies of their so created projects themself to address any security vulnerabilities, including any maven dependencies, maven plugin dependencies and npm package dependencies. Furthermore and in particular for maven dependencies it is important to understand that they usually describe the minimal API version the code supports at runtime. The dependency versions effectively used at runtime may be newer and not vulnerable. Please always verify any reported vulnerable (transitive) dependencies against the list of bundles deployed at runtime in AEM as a Cloud Services or the currently used Service Pack on AMS or on-prem.
Users of the archetype are responsible for updating the build-time dependencies of their projects created with the archetype to address any security vulnerabilities, including any maven dependencies, maven plugin dependencies, and npm package dependencies. Furthermore (and in particular for maven dependencies) it is important to understand that they usually describe the minimal API version the code supports at runtime. The dependency versions effectively used at runtime may be newer and not vulnerable. Please always verify any reported vulnerable (transitive) dependencies against the list of bundles deployed at runtime in AEM as a Cloud Services or the currently used Service Pack on AMS or on-prem.

Please continue to report security vulnerabilities to us. However, we use some 3rd party dependencies, which we only have partial control over. For those it is important to report the vulnerabilities directly to the owner or to the contributors of these dependencies. We will update the archetype once the transitive dependencies have been updated, but that may take a considerable amount of time.
Please continue to report security vulnerabilities to Adobe. But please understand that Adobe uses some third-party dependencies, which it only has partial control over. For such dependencies it is important to report the vulnerabilities directly to the owner or to the contributors of these dependencies. Adobe will update the archetype once the transitive dependencies have been updated, but that may take more time.

In order to update update transitive dependencies, please exclude the vulnerable transitive dependency and declare a more recent version within the project. For example:

Expand All @@ -140,4 +140,4 @@ In order to update update transitive dependencies, please exclude the vulnerable
<artifactId>commons-io</artifactId>
<version>2.7</version>
</dependency>
```
```

0 comments on commit cff1cc8

Please sign in to comment.