+Before you post a vulnerability, first determine if the vulnerability can be mitigated by a properly curated security policy. Frist, verify your policy using the [validation tool](https://imagemagick-secevaluator.doyensec.com/). Next, use a [development container](https://containers.dev/), available in the `.devcontainer/security` folder, to verify that the security issue can be reproduced with the latest source code and your security policy. If you feel confident that the security policy does not address the vulnerability, post the vulnerability as a [security advisory](https://github.com/ImageMagick/ImageMagick6/security/advisories/new). Most vulnerabilities are reviewed and resolved within 48 hours.
0 commit comments