关于本站
91Kis和他的爱妻91YuchengH共同创作。
安全策略 · Security Policy
安全策略(中文)
维护者: 91Kis & 91YuchengH
联系邮箱: Video91_official@hotmail.com
覆盖范围
- 本仓库 main 分支的最新代码
- 部署在 https://91kis.github.io/91Video/ 的线上页面
不在范围(示例):
- 第三方平台/基础设施本身的问题(如 GitHub、Firebase),除非因我们配置不当造成影响
- 社工、物理攻击、暴力破解、垃圾信息或大流量 DoS
- 需要已被攻陷的设备/账号或用户安装恶意软件才能实现的漏洞
报告方式
- 请不要建立公开 Issue 或 PR。
- 首选:GitHub 私密漏洞上报(仓库 → Security → Report a vulnerability)。
- 若不可用,可发邮件至 Video91_official@hotmail.com。
请尽量提供:
- 清晰复现步骤与影响说明
- PoC 或者操作步骤
- 受影响的 URL、提交哈希或版本
- 复现环境(浏览器/系统)与日志/录屏
- 你的联系方式以便沟通
处理与时限
- 72 小时内确认收到
- 7 天内完成初步分级与定级(参考 CVSS v3.1)
- 修复前每 7 天至少一次状态更新
- 目标修复时限:高/危急级不超过 90 天(可加速)
- 我们会在发布说明中感谢报告者(如不希望署名可告知);重复报告按先到原则致谢。
协同披露
- 在我们修复前请暂缓公开披露
- 仅在自有账号/测试数据上测试,勿触碰真实用户数据
安全港(善意研究)
- 不进行隐私数据读取/外传、不进行 DoS、不进行社工
- 遵守速率限制,仅使用测试数据/账号
- 若意外接触到敏感数据,应立即停止并报告
不在范围(示例)
- 需要用户自行在控制台粘贴代码的 Self-XSS
- 无敏感操作页面的点击劫持
- 无实质影响的限流类问题
- 仅在已被攻陷的设备/账号条件下才能实现的漏洞
赏金
目前不提供现金赏金;欢迎接受公开/私下致谢。
Security Policy · 91Video
Maintainers: 91Kis & 91YuchengH
Contact: Video91_official@hotmail.com
Supported Versions
- The latest main branch of this repository.
- The currently deployed site (GitHub Pages).
Scope
In scope:
- This repository’s code and configurations
- The deployed site at https://91kis.github.io/91Video/ and subpaths
Out of scope (examples):
- Third-party platforms or infrastructure (e.g., GitHub, Firebase) unless the issue arises from our misuse
- Social engineering, physical attacks, account brute-forcing, spam or volumetric DoS
- Findings that require compromised devices/accounts or user-installed malware
Reporting a Vulnerability
Please DO NOT open public issues or pull requests.
Preferred channel: GitHub Private Vulnerability Reporting. Open the repository → Security → Report a vulnerability.
If GitHub reporting is unavailable, email us at Video91_official@hotmail.com.
Please include:
- Clear, reproducible description and impact
- PoC or step-by-step reproduction
- Affected URL(s), commit hash or version
- Environment (browser, OS) and any logs/screen recordings
- Your contact info for coordination
Handling & Timelines
- Acknowledgment: within 72 hours
- Initial triage & severity (CVSS v3.1 as reference): within 7 days
- Status updates: at least every 7 days until resolution
- Target remediation: up to 90 days for High/Critical (expedited when feasible)
- We credit the reporter in release notes (unless anonymity is requested). For duplicate reports, credit goes to the first verifiable submission.
Coordinated Disclosure
- Please allow us time to investigate and release a fix before public disclosure.
- Do not test against real users’ data; use your own test accounts only.
Safe Harbor (Good-Faith Research)
- Avoid privacy violations, data exfiltration, service disruption (DoS), or social engineering
- Respect rate limits and use test data/accounts only
- Stop immediately if sensitive data is encountered and report it to us
Out of Scope (Examples)
- Self-XSS requiring user to paste code into the console
- Clickjacking on pages without sensitive actions
- Lack of rate limiting without demonstrable impact
- Vulnerabilities requiring already-compromised devices or accounts
Bounties
This project does not currently offer monetary bug bounties. We are happy to provide public or private thanks.