Update SECURITY.MD

This commit is contained in:
Namhyeon Go 2023-07-27 15:14:55 +09:00 committed by GitHub
parent c24a04711f
commit 4dda3c6d40
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -10,14 +10,14 @@ WelsonJS is typically used for the following purposes:
* Exploring vulnerabilities of equipment within the local network. * Exploring vulnerabilities of equipment within the local network.
* Improving the availability of VPN or Proxy clients. * Improving the availability of VPN or Proxy clients.
* Building automation, CD/CI (Continuous Integration/Continuous Delivery), DevOps, and SecOps. * Building automation, CD/CI (Continuous Integration/Continuous Delivery), DevOps, and SecOps.
* Asset evaluation (e.g. Online shopping history) * Asset evaluation (e.g. Get a purchase history from online shopping and delivery websites)
Note 1: If you plan to use WelsonJS for a purpose other than those mentioned above, please contact us beforehand. ## Notes
1. If you plan to use WelsonJS for a purpose other than those mentioned above, please contact us beforehand.
2. If you are looking for ways to use WelsonJS more efficiently, referencing the [LOLBAS (Living Off The Land Binaries and Scripts)](https://lolbas-project.github.io/) list can be helpful.
Note 2: A similar approach to WelsonJS has been called LOLBins in the cybersecurity community since 2018. While WelsonJS is not intended to be used for malicious purposes, it may provide useful hints for extensions. ## Guidelines for the use of online shopping and delivery websites
We are aware of cases where WelsonJS has been used for asset valuation to access websites of online shopping or delivery companies. This is a good use case, but there have been reports of website downtime caused by excessive concurrent requests. Please exercise caution and avoid excessive simultaneous executions.
## Guidelines for the use of online shopping platforms
It has been observed within the past two years that some users of this tool have produced results similar to DDoS attacks when using online shopping platforms. When using online shopping platforms, it is strongly advised to use them only for asset evaluation purposes. Failure to comply with this recommendation may result in legal action being taken.
## Report abuse ## Report abuse
If you discover any instances of this project being misused, please report them. If you discover any instances of this project being misused, please report them.