Skip to content

Vulnerability Management Process

SystemRole
DependabotDependency vulnerability detection across all Meridian7-io repositories
CrowdStrikeEndpoint vulnerability findings and threat detections
GitHub Secret ScanningExposed secrets in repository history
Claude Security ReviewAI-powered security review on PRs via security-review.yml workflow

Each vulnerability is tracked as a GitHub Issue via the Vulnerability Remediation template.

SeverityDeadlineEnforcement
Critical72 hoursWeekly security review
High7 daysWeekly security review
Medium30 daysWeekly security review
LowNext sprintMonthly review
  1. Detection — Scanner surfaces the vulnerability (Dependabot alert, CrowdStrike finding, Claude Security Review finding, secret scanning alert)
  2. Triage — Reviewer creates a GitHub Issue, assigns severity and SLA deadline
  3. Remediation — Engineer applies fix via pull request
  4. Verification — Detection system confirms resolution; verify runner confirms no regressions:
    doppler run -p m7-security -c prd -- python3 automation/scripts/runner.py --mode verify
  5. Close — GitHub Issue closed with evidence of resolution

If a vulnerability cannot be remediated, it is documented in automation/config/accepted-risks.yaml with justification, compensating controls, and a 6-month review date.

ArtifactLocation
Dependabot alertsevidence/logs/github/YYYY/MM/github-cc6.1-*-dependabot-alerts.json
CrowdStrike alertsevidence/logs/crowdstrike/YYYY/MM/crowdstrike-cc7.2-*-alerts.json
Branch protectionevidence/logs/github/YYYY/MM/github-cc8.1-*-branch-protection.json


Meridian Seven — Confidential