Thank you for your interest in contributing to the telco-sec.com research project! This document outlines the process for contributing to our research, tools, and documentation.
- Code of Conduct
- Getting Started
- Contribution Process
- Research Contributions
- Tool Development
- Documentation
- Community Engagement
- Licensing
All contributors are expected to adhere to our Code of Conduct. By participating, you agree to uphold these standards and respect all community members.
Before contributing, ensure you have:
- A GitHub account
- Familiarity with Git and GitHub workflows
- Basic understanding of telecom security concepts
- Reviewed our existing research and documentation
- Fork the repository
- Clone your forked repository locally
- Set up the development environment following the instructions in DEVELOPMENT.md
- Create a new branch for your contribution
- Check our Issue Tracker for open tasks
- Look for issues labeled "good first issue" if you're new
- Join discussions in relevant issues to express interest
- Create a new issue if you identify a gap not currently addressed
- Create a feature branch:
git checkout -b feature/your-feature-name - Follow our Coding Standards for tool development
- Follow our Research Methodology for security research
- Make regular commits with clear messages
- Ensure your code/research passes all tests
- Update documentation as needed
- Push your changes to your fork
- Create a pull request to the main repository
- Fill out the pull request template completely
- At least two maintainers will review your contribution
- Address any feedback or requested changes
- Participate in discussions about your contribution
- Once approved, a maintainer will merge your contribution
For substantial research contributions:
- Create an issue using the "Research Proposal" template
- Include the following information:
- Research topic and scope
- Methodology
- Expected outcomes
- Required resources
- Timeline
- Wait for maintainer approval before proceeding
All research contributions must:
- Follow our Research Methodology
- Provide reproducible results
- Include complete documentation
- Adhere to responsible disclosure principles
- Properly cite all sources and prior work
- Include practical security implications
For vulnerability research:
- Use our standardized testing methodology
- Document all findings using the vulnerability template
- Include proof-of-concept code when appropriate
- Follow responsible disclosure procedures
- Work with maintainers on disclosure timeline
- Provide remediation guidance when possible
New tools should:
- Solve a specific telecom security problem
- Include comprehensive documentation
- Have proper error handling
- Include unit and/or integration tests
- Follow our coding standards
- Be compatible with our existing toolset
All tool
Trademarks:
All product names, logos, and brands are property of their respective owners. All company, product, and service names used in this documentation are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.