![S on X: When you report a security vulnerability but they have](https://miro.medium.com/v2/resize:fit:1200/1*XZk3HnXic4khpJAZQLAz-g.png)
Do NOT report security vulnerabilities, report impacts instead!, by Ricardo Iramar dos Santos
![S on X: When you report a security vulnerability but they have](https://docs.gitlab.com/ee/user/application_security/vulnerability_report/img/project_security_dashboard_status_change_v16_0.png)
Vulnerability Report
![S on X: When you report a security vulnerability but they have](https://docs.npmjs.com/packages-and-modules/securing-your-code/audit-report-suggested-fixes.png)
Auditing package dependencies for security vulnerabilities
![S on X: When you report a security vulnerability but they have](https://images.spiceworks.com/wp-content/uploads/2021/04/11121048/Security-Vulnerabilities1.png)
What Is a Security Vulnerability? Definition, Types, and Best Practices for Prevention - Spiceworks
VDP Programs/Platform & Security
![S on X: When you report a security vulnerability but they have](https://purplesec.us/wp-content/uploads/2019/07/8-steps-to-performing-a-network-vulnerability-assessment-infographic.png)
How To Conduct A Vulnerability Assessment In 8 Steps
![S on X: When you report a security vulnerability but they have](https://docs.gitlab.com/ee/development/integrations/img/example_vuln.png)
Security scanner integration
![S on X: When you report a security vulnerability but they have](https://www.hackerone.com/sites/default/files/inline-images/Aodbe%202.png)
Bug Bounty vs. VDP, Which Program Is Right for You?
![S on X: When you report a security vulnerability but they have](https://purplesec.us/wp-content/uploads/2021/11/How-to-conduct-a-security-risk-assessment.png)
How To Conduct A Security Risk Assessment
![S on X: When you report a security vulnerability but they have](https://images.spiceworks.com/wp-content/uploads/2021/04/10121212/Identify-a-Security.png)
What Is a Security Vulnerability? Definition, Types, and Best Practices for Prevention - Spiceworks