Here is a collection of mailing list postings made by various people describing how they use Git in their workflow. When a vulnerability is reported, we follow these guidelines to assess the vulnerability, create and review a fix, and coordinate embargoed security releases.