diff --git a/composer.json b/composer.json index 1f044ff..a8edffa 100644 --- a/composer.json +++ b/composer.json @@ -1,5 +1,5 @@ { - "name": "inextensodigital/command-bus-bundle", + "name": "fulll/command-bus-bundle", "type": "symfony-bundle", "description": "rezzza/command-bus integration to Symfony", "keywords": ["command", "bus", "bundle"], @@ -12,7 +12,7 @@ "require": { "php": ">=5.5.0", "symfony/event-dispatcher": "~2.5|~3.0|~4.0", - "inextensodigital/command-bus": "^3.4" + "fulll/command-bus": "^3.4" }, "autoload": { "psr-4": { "Rezzza\\CommandBusBundle\\": "" } diff --git a/security.md b/security.md index 6033fb4..1dfdceb 100644 --- a/security.md +++ b/security.md @@ -1,16 +1,16 @@ ## Security -We take the security of our software products and components seriously, which includes all source code repositories managed through our [In Extenso Digital's GitHub organization](https://github.com/inextensodigital). +We take the security of our software products and components seriously, which includes all source code repositories managed through our [Fulll's GitHub organization](https://github.com/fulll). -If you believe you have found a security vulnerability in any In Extenso Digital's repository that meets Wikipedia's definition of a security vulnerability ([English version](https://en.wikipedia.org/wiki/Vulnerability_(computing)), [French version](https://fr.wikipedia.org/wiki/Vuln%C3%A9rabilit%C3%A9_(informatique))), please report it to us as described below. +If you believe you have found a security vulnerability in any Fulll's repository that meets Wikipedia's definition of a security vulnerability ([English version](https://en.wikipedia.org/wiki/Vulnerability_(computing)), [French version](https://fr.wikipedia.org/wiki/Vuln%C3%A9rabilit%C3%A9_(informatique))), please report it to us as described below. ## Reporting security vulnerability Issues :warning: **Please do not report security vulnerabilities through public GitHub issues.** -Instead, **please report them by email** to [rssi@inextenso.digital](mailto:rssi@inextenso.digital). +Instead, **please report them by email** to [rssi@fulll.fr](mailto:rssi@fulll.fr). -You should receive a response as soon as possible. If for some reason you do not, please follow up via email to our [Administrator Team](mailto:admin@inextenso.digital) to ensure we received your original message. +You should receive a response as soon as possible. If for some reason you do not, please follow up via email to our [Administrator Team](mailto:admin@fulll.fr) to ensure we received your original message. For private repositories, you can also send an email or directly use the dedicated issue template for security vulnerability. @@ -31,4 +31,4 @@ We prefer all communications to be in English, but if you are not comfortable, F ## Policy -In Extenso Digital follows the principle of [Microsoft's Coordinated Vulnerability Disclosure](https://www.microsoft.com/en-us/msrc/cvd). +Fulll follows the principle of [Microsoft's Coordinated Vulnerability Disclosure](https://www.microsoft.com/en-us/msrc/cvd).