Scrum deployment with Tuleap

Industries
Your role, your challenges ⭐

Scrum deployment with Tuleap

Discover Tuleap

Centralize requirements, traceability, tests, and documentation to ensure compliance and speed up delivery, from prototype to certified system.

Features
Explore Tuleap Editions
Resources
Latest blog post

Tuleap, the best alternative to Jira

Latest replays
Latest ebook

Scrum deployment with Tuleap

Latest customer story

The French National Institute of Statistics (Insee) empowers its agile project management with Tuleap

 

Reporting a security issue in Tuleap

 

All security bugs in Tuleap should be reported by emailing security@tuleap.org.

A member of our security team will your vulnerability report within 3 business days, and you will receive a response
indicating the next steps in handling your report.

Vulnerabilities in third-party applications should be reported to their respective maintainers. The Tuleap security team
is not responsible for the security of these applications but will attempt to contact the third-party maintainer if an
issue is brought to his attention.

The provided email address to send vulnerability reports supports hop-by-hop encryption. If you feel the report
needs end-to-end encryption please reach out to us, we will try to find a solution accommodating everyone involved.

Any efforts made for improving the security of the Tuleap software or its users will be greatly appreciated by the
Tuleap community. If you want your disclosure will be publicly acknowledged in the public report. Please refrain from
requesting compensation for reporting vulnerabilities. At this time the Tuleap project does not deliver bounties.

Issues not affecting the security of the Tuleap software but of one of the services managed for the Tuleap community
(such as issues affecting the tuleap.org website) can be reported under the same guidelines but do not warrant a public
acknowledgment. SPF, DKIM, or DMARC issues in one of the services managed for the Tuleap community must not be reported.

 

 

Coordinated Disclosure Guidelines

 

The Tuleap community would be grateful if security researchers comply with the following guidelines while researching and reporting vulnerabilities:

Our security team follows the following guidelines: