aejo is at v0.1.0. only the current release receives fixes.
| version | supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ (no public releases existed) |
don't open a public issue. email akali11112001@gmail.com with subject
[aejo security] <short title> and the following body:
- what you found (one paragraph)
- how to reproduce (steps or a small repro repo)
- potential impact (worst-case, attacker capability assumed)
- your suggested mitigation, if any
- whether you want public credit and what name/handle to use
we'll acknowledge within 72 hours and aim to ship a fix within 14 days for high-severity issues. for lower severity, expect a fix in the next minor.
- secret leakage — if a flag's
msgfield could echo back a token, email bound to a private setting, or any credential, that's in scope - scope escalation — if there's a path through aejo to make a write call using a read-only token, that's in scope (we believe there isn't but happy to be proven wrong)
- denial of service via crafted github responses — if a particular json
shape from
/users/<login>can cause aejo to hang, oom, or loop, that's in scope - rate-limit footgun — if a default code path makes more api calls than
the documented
~10/loginbudget, that's in scope
- "aejo gave a wrong verdict on account X" — open a normal issue with the scan output and the actual ground truth. that's a calibration bug, not a security bug.
- "i ran aejo against an account that doesn't exist and it errored" — yes, it does, on purpose
- "i hit the github rate limit" — set
GITHUB_TOKEN - vulnerabilities in
@octokit/rest,chalk,pino, or other deps — please report those upstream and we'll bump the version once they ship
reporters who file in-scope, reproducible issues get listed in CHANGELOG.md under the release that contains the fix, unless they opt out.
aejo's runtime needs zero write scopes on the target. if you're operating
aejo yourself, generate a fine-grained PAT with public_repo and read:user
only. giving it more is harmless (aejo ignores them) but unnecessary.