Prioritized Labels
Other Labels
  • Story: Bug
  • Severity: Critical
    The defect affects critical functionality or critical data. It does not have a workaround. Example: Unsuccessful installation, complete failure of a feature.
  • Status: New/Suggestion
    New suggestion to build a feature/user story, product enhancement, bug etc.
  • Story: User Story
    Short, simple description of a feature told from the perspective of the person who desires the new capability, usually a user or customer of the system. They typically follow a simple template: As a < type of user >, I want < some goal > so that < some reason >.
  • Status: In-Progress
    The issue is in development.
  • Status: Code-Review
    The issue is under peer code review.
  • Status: QA
    The issue is fixed/implemented and is waiting for approval from the QA team.
  • Other: Upstream
    This issue should be fixed/implemented in the upstream repository
  • Severity: Major
    The defect affects major functionality or major data. It has a workaround but is not obvious and is difficult. Example: A feature is not functional from one module but the task is doable if 10 complicated indirect steps are followed in another module/s.
  • Severity: Minor
    The defect affects minor functionality or non-critical data. It has an easy workaround. Example: A minor feature that is not functional in one module but the same task is easily doable from another module.
  • Severity: Trivial
    The defect does not affect functionality or data. It does not even need a workaround. It does not impact productivity or efficiency. It is merely an inconvenience. Example: Petty layout discrepancies, spelling/grammatical errors.
  • Importance: 16
  • Importance: 7
  • Importance: 5
  • Importance: 2
  • Status: Cannot-Reproduce
    The defect cannot be reproduced.
  • Status: Info-Needed
    Additional information needed to proceed with the issue
  • Emphasis: UX
    User Experience (UX) is important in this issue
  • Emphasis: Cryptography
    The issue needs knowledge of cryptography
  • Emphasis: Security
    Security of the system/component needs to be analyzed precisely