Skip to content

Latest commit

 

History

History
39 lines (27 loc) · 3.28 KB

CONTRIBUTING.md

File metadata and controls

39 lines (27 loc) · 3.28 KB

Contributing to OWASP CSRF Protector PHP

CSRF Protector is a community project, and we are always delighted to welcome new contributors!

There are lots of ways you can contribute:

Got a Question or Problem?

If you have a question or problem relating to using this project then the first thing to do is to check:

Found an Issue?

If you have found a bug then raise an issue on the CSRF Protector repo: https://github.com/mebjas/CSRF-Protector-PHP/issues

Its worth checking to see if its already been reported, and including as much information as you can to help us diagnose your problem.

Found a Vulnerability?

If you think you have found a vulnerability in CSRF Protector then please report it directly on email at minhazav@gmail.com or [minhaz@owasp.org](mailto: minhaz@owasp.org)

We are always very grateful to researchers who report vulnerabilities responsibly and will be very happy to give credit for the valuable assistance they provide.

Have a Feature Request?

If you have a suggestion for new functionality then you can raise an issue on the CSRF Protector PHP repo: https://github.com/mebjas/CSRF-Protector-PHP/issues

Its worth checking to see if its already been requested, and including as much information as you can so that we can fully understand your requirements.

Become a CSRF Protector Evangelist

Please feel free to write more about this project on how it works or how to use it. Please feel free to send a pull request by adding a reference to your article in the README.md or CONTRIBUTING.md.

Help Improve the Documentation

The source for the CSRF Protector OWASP wiki User Guide is hosted at OWASP/www-project-csrfprotector and is hosted at https://www2.owasp.org/www-project-csrfprotector/. Please feel free to send a pull request to add updates to the documentation.

Coding

There's always lots of coding to be done! If you feel something can be improved feel free to send a pull request.