From 839ad20fd21a32c09463f9ab17f4e3e9ac470ee0 Mon Sep 17 00:00:00 2001 From: Eslam Salem Date: Wed, 13 Apr 2022 04:48:04 +0200 Subject: [PATCH] Update SECURITY.md --- SECURITY.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/SECURITY.md b/SECURITY.md index a9f38e96..91756a61 100644 --- a/SECURITY.md +++ b/SECURITY.md @@ -18,3 +18,5 @@ To ensure the timely response to your report, please ensure that the entirety of The EJS team will then evaluate your report and will reply with the next steps in handling your report and may ask for additional information or guidance. +## out of scope vulnerabilities +If you give end-users unfettered access to the EJS render method, you are using EJS in an inherently un-secure way. Please do not report security issues that stem from doing that. EJS is effectively a JavaScript runtime. Its entire job is to execute JavaScript. If you run the EJS render method without checking the inputs yourself, you are responsible for the results.