|
| 1 | +name: All for One, One For All bounty submission |
| 2 | +description: Submit a CodeQL query for the All For One, One For All bounty (https://securitylab.github.com/bounties#allforone) |
| 3 | +title: "[<language>]: <short description>" |
| 4 | +labels: [All For One] |
| 5 | +body: |
| 6 | + - type: markdown |
| 7 | + attributes: |
| 8 | + value: | |
| 9 | + # Introduction |
| 10 | +
|
| 11 | + Thank you for submitting a query to the GitHub CodeQL project! |
| 12 | +
|
| 13 | + After you submit this issue, the GitHub Security Lab and CodeQL teams will triage the submission and, if it meets the Query Bounty Program requirements, we will grant you a bounty through our HackerOne program. |
| 14 | +
|
| 15 | + Please make sure to carefully read the [bounty program description and conditions](https://securitylab.github.com/bounties#allforone) |
| 16 | +
|
| 17 | + # Questionnaire |
| 18 | + - type: input |
| 19 | + id: pr_url |
| 20 | + attributes: |
| 21 | + label: Query PR |
| 22 | + description: Link to pull request with your CodeQL query |
| 23 | + placeholder: | |
| 24 | + ex. https://github.com/github/codeql/pull/nnnn |
| 25 | + validations: |
| 26 | + required: true |
| 27 | + - type: dropdown |
| 28 | + id: language |
| 29 | + attributes: |
| 30 | + label: Language |
| 31 | + description: What programming language is your query written for? |
| 32 | + options: |
| 33 | + - Java |
| 34 | + - Javascript |
| 35 | + - GoLang |
| 36 | + - Python |
| 37 | + - C/C++ |
| 38 | + - C# |
| 39 | + validations: |
| 40 | + required: true |
| 41 | + - type: textarea |
| 42 | + id: cve_ids |
| 43 | + attributes: |
| 44 | + label: CVE(s) ID list |
| 45 | + description: Enter a list of the CVE ID(s) associated with this query, one bullet for each distinct CVE. GitHub will automatically link CVE IDs to the [GitHub Advisory Database](https://github.com/advisories). If the result(s) is **NOT YET** fixed **nor disclosed**, and you are still waiting for a CVE, then you can privately share your result via email to [security@github.com](mailto:security@github.com?subject=[BugBounty]%20Issue%20#000%20useful%20result) |
| 46 | + placeholder: | |
| 47 | + ex. |
| 48 | + - [CVE-20nn-xxxx](<relevant URL>) |
| 49 | + - [CVE-20nn-yyyy](<relevant URL>) |
| 50 | + validations: |
| 51 | + required: true |
| 52 | + - type: input |
| 53 | + id: cwe |
| 54 | + attributes: |
| 55 | + label: CWE |
| 56 | + description: "[CWE](https://cwe.mitre.org/data/index.html) that best fits the vulnerability class modeled with your query" |
| 57 | + placeholder: | |
| 58 | + ex. CWE-502: Deserialization of Untrusted Data |
| 59 | + validations: |
| 60 | + required: false |
| 61 | + - type: textarea |
| 62 | + id: report |
| 63 | + attributes: |
| 64 | + label: Report |
| 65 | + description: Describe the vulnerability. Provide any information you think will help GitHub assess the impact your query has on the open source community. |
| 66 | + placeholder: | |
| 67 | + 1. What is the vulnerability? |
| 68 | + 2. How does the vulnerability work? |
| 69 | + 3. What strategy do you use in your query to find the vulnerability? |
| 70 | + 4. How have you reduced the number of **false positives**? |
| 71 | + 5. Other information? |
| 72 | + validations: |
| 73 | + required: true |
| 74 | + - type: checkboxes |
| 75 | + id: social |
| 76 | + attributes: |
| 77 | + label: Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc). |
| 78 | + description: We would love to have you spread the word about the good work you are doing |
| 79 | + options: |
| 80 | + - label: "Yes" |
| 81 | + - label: "No" |
| 82 | + validations: |
| 83 | + required: true |
| 84 | + - type: input |
| 85 | + id: social_url |
| 86 | + attributes: |
| 87 | + label: Blog post link |
| 88 | + description: If you have already blogged about your query, please provide a link. |
| 89 | + validations: |
| 90 | + required: false |
0 commit comments