Thank you for your interest in contributing to the Telecom Security Library! This document provides guidelines for contributing research, documentation, and improvements to our project.
- Code of Conduct
- How Can I Contribute?
- Submitting Research Papers
- Reporting Issues
- Pull Request Process
- Documentation Standards
This project adheres to the Contributor Covenant Code of Conduct. By participating, you are expected to uphold this code.
We welcome high-quality research papers on telecommunications security topics:
- Ensure Relevance: Papers should relate to one of our 13 categories
- Check Quality: Research should be technically sound and well-documented
- Verify Originality: Ensure you have rights to share the research
- Use the Template: Submit via our Research Submission Issue Template
Accepted Formats:
- PDF research papers
- Technical whitepapers
- Conference presentations
- Case studies
Found a problem? Help us improve:
- Broken Links: Use the Bug Report template
- Outdated Information: Create an issue with details and sources
- Missing Content: Suggest additions via Feature Request
Have ideas for improvements?
- Check existing issues to avoid duplicates
- Use the Feature Request template
- Provide clear use cases and benefits
- Include examples if applicable
- Fork the repository and create your branch from
main - Test your changes locally using
npm start - Run validation with
npm run validate - Update documentation if you've changed functionality
- Clear Description: Explain what and why, not just how
- Link Issues: Reference related issues using
#issue-number - Small Commits: Keep changes focused and atomic
- Follow Standards: Match existing code style and structure
- My code follows the project's style guidelines
- I have performed a self-review of my changes
- I have commented my code where necessary
- I have updated the documentation accordingly
- My changes generate no new warnings or errors
- I have tested my changes locally
- Place research papers in appropriate category folders (e.g.,
5G/,SS7/) - Use descriptive filenames:
author-year-topic.pdf - Include metadata in YAML format when applicable
- Use clear, concise language
- Include table of contents for long documents
- Add links to related resources
- Use proper heading hierarchy (H1 → H2 → H3)
Follow conventional commit format:
type(scope): brief description
Detailed explanation if needed
Fixes #issue-number
Types:
feat: New feature or research paperfix: Bug fix or correctiondocs: Documentation changeschore: Maintenance tasks
Examples:
feat(5g): add OpenRAN security research paper
docs(readme): update video section with new content
fix(links): correct broken references in SS7 section
- Ensure PDF is readable and properly formatted
- Include author information and publication date
- Add abstract or summary (100-200 words)
- List key topics and tags
Use the Research Submission template and provide:
- Paper title and authors
- Publication date and venue (if applicable)
- Category (4G, 5G, SS7, etc.)
- Brief summary
- Link to paper or attach file
- Initial Review (1-3 days): We verify relevance and quality
- Technical Review (3-7 days): Subject matter experts review content
- Integration (1-2 days): Paper is added to appropriate category
- Publication: Changes are deployed to GitHub Pages
- Questions: Open a Discussion
- Chat: Join our Discord community
- Email: contact@telcosec.org
Contributors are recognized in:
- Repository contributors list
- Annual acknowledgments
- Community highlights
Thank you for helping improve telecommunications security knowledge!