From 2a1d958f93d8ba0f1f25f0e0655a20933a0145cb Mon Sep 17 00:00:00 2001 From: Cassian Assael Date: Mon, 13 Dec 2021 10:58:27 +0100 Subject: [PATCH] rename orga to fulll --- composer.json | 2 +- security.md | 10 +++++----- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/composer.json b/composer.json index 201d5ce..e70d6e7 100644 --- a/composer.json +++ b/composer.json @@ -1,5 +1,5 @@ { - "name": "inextensodigital/command-bus", + "name": "fulll/command-bus", "type": "library", "description": "Easy command bus", "keywords": ["command", "bus"], diff --git a/security.md b/security.md index 6033fb4..1dfdceb 100644 --- a/security.md +++ b/security.md @@ -1,16 +1,16 @@ ## Security -We take the security of our software products and components seriously, which includes all source code repositories managed through our [In Extenso Digital's GitHub organization](https://github.com/inextensodigital). +We take the security of our software products and components seriously, which includes all source code repositories managed through our [Fulll's GitHub organization](https://github.com/fulll). -If you believe you have found a security vulnerability in any In Extenso Digital's repository that meets Wikipedia's definition of a security vulnerability ([English version](https://en.wikipedia.org/wiki/Vulnerability_(computing)), [French version](https://fr.wikipedia.org/wiki/Vuln%C3%A9rabilit%C3%A9_(informatique))), please report it to us as described below. +If you believe you have found a security vulnerability in any Fulll's repository that meets Wikipedia's definition of a security vulnerability ([English version](https://en.wikipedia.org/wiki/Vulnerability_(computing)), [French version](https://fr.wikipedia.org/wiki/Vuln%C3%A9rabilit%C3%A9_(informatique))), please report it to us as described below. ## Reporting security vulnerability Issues :warning: **Please do not report security vulnerabilities through public GitHub issues.** -Instead, **please report them by email** to [rssi@inextenso.digital](mailto:rssi@inextenso.digital). +Instead, **please report them by email** to [rssi@fulll.fr](mailto:rssi@fulll.fr). -You should receive a response as soon as possible. If for some reason you do not, please follow up via email to our [Administrator Team](mailto:admin@inextenso.digital) to ensure we received your original message. +You should receive a response as soon as possible. If for some reason you do not, please follow up via email to our [Administrator Team](mailto:admin@fulll.fr) to ensure we received your original message. For private repositories, you can also send an email or directly use the dedicated issue template for security vulnerability. @@ -31,4 +31,4 @@ We prefer all communications to be in English, but if you are not comfortable, F ## Policy -In Extenso Digital follows the principle of [Microsoft's Coordinated Vulnerability Disclosure](https://www.microsoft.com/en-us/msrc/cvd). +Fulll follows the principle of [Microsoft's Coordinated Vulnerability Disclosure](https://www.microsoft.com/en-us/msrc/cvd).