| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
- Email: Create a private security advisory at https://github.com/reschjonas/leaktor/security/advisories/new
Please include the following information:
- Type of vulnerability
- Full paths of affected source file(s)
- Location of the affected code (tag/branch/commit/direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Acknowledgment: Within 48 hours
- Initial assessment: Within 7 days
- Fix timeline: Depends on severity, typically 30-90 days
- Credit: You will be credited in the security advisory (if desired)
When using Leaktor:
- Validation Flag - Only use
--validatewhen authorized to test credentials - Token Storage - Store GitHub tokens securely, never commit them
- Output Files - Be careful with JSON/SARIF outputs containing actual secrets
- False Positives - Review findings before sharing reports
- CI/CD - Use
--fail-on-foundin pipelines to prevent secret commits
The --validate flag makes API calls to check if secrets are active:
- AWS validation uses AWS STS GetCallerIdentity
- GitHub validation uses GitHub API
- Use responsibly and only with proper authorization
Output files (JSON, SARIF, HTML) may contain:
- Partial or full secret values
- File paths and line numbers
- Git commit information
- Handle with care and don't commit to repositories
- No external telemetry - All scanning happens locally
- Opt-in validation - Network calls only with explicit
--validateflag - Secret redaction - Secrets are partially redacted in console output
- Entropy analysis - Reduces false positives
- Context awareness - Understands test files and examples
We follow responsible disclosure practices:
- Security researchers have 90 days to report before public disclosure
- We aim to patch critical vulnerabilities within 30 days
- Coordinated disclosure with security researchers
- Public credit given to reporters (if desired)
We thank the following researchers for responsibly disclosing vulnerabilities:
- (None yet - be the first!)
Last Updated: 2025-11-17