-
-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Voting Closed] Jenkins Security MVP 2023 🏆 #6034
Comments
I would like to nominate:
|
Devin Nusbaum @dwnusbaum
|
Daniel Beck @daniel-beck
|
Valdes Che Zogou @ValdesChe reported several dozen security vulnerabilities in Jenkins and Jenkins plugins in 2022. Most notable findings:
Of course there are many others, Valdes was credited in most security advisories in the second half of 2022, and beyond. |
Kevin Guerroudj @Kevin-CB joined CloudBees and the Jenkins security team in late 2021, quickly becoming a prolific contributor. Since he joined he has reported well over a hundred security vulnerabilities, and has been credited in almost every advisory since then. Many of his discoveries were the result of in-depth reviews of the Jenkins plugin ecosystem. Plugins that are safer now due to his discoveries include Badge, CVS, Dashboard View, Git Parameter, GitLab, Jira, Node and Label parameter, and promoted builds. These are not his first contributions to Jenkins security though. Kevin has already been nominated previously in 2021 for his contributions to Jenkins security during his coursework at university. He's also a frequent reviewer of new plugin hosting requests, ensuring a high standard of security for newly hosted plugins. |
I second the nomination of @daniel-beck for his contributions to security processes, security documentation, and security issues. He's a dedicated and skilled contributor that provides excellent guides that allow others to participate in security fixes. I've benefited from his clear descriptions and his high standards in software development and in documentation. |
At this time, the nomination period has closed, and the voting period has opened. To participate and vote, use this link to navigate to the google form and fill out your responses. |
This issue is being closed, as the voting period has now ended, and the Jenkins awards winners will be announced at cdCon 2023 (May 8-9). Thanks to all for participating and helping us recognize the amazing contributions and work that has been done over the past year. |
This issue is to receive nominations for the Jenkins Security MVP 2023. This award is presented to an individual most consistently providing excellent security reports or resolving security issues.
To nominate someone, reply to this issue with the following:
Nomination Deadline: Friday, March 3, 2023
Please note: Last year's winner, Wadeck Follonier, cannot win the award for Jenkins Security MVP again this year.
More details are available here https://github.com/cdfoundation/foundation/blob/main/CDF%20Awards%20Guidelines.md
The text was updated successfully, but these errors were encountered: