Skip to content

Commit 60740d2

Browse files
authored
Merge pull request #468 from github/bounty_template_forms
port all-for-one template to issue forms
2 parents 01a114b + 14f0afc commit 60740d2

2 files changed

Lines changed: 90 additions & 32 deletions

File tree

.github/ISSUE_TEMPLATE/all-for-one.md

Lines changed: 0 additions & 32 deletions
This file was deleted.
Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,90 @@
1+
name: All for One, One For All bounty submission
2+
description: Submit a CodeQL query for the All For One, One For All bounty (https://securitylab.github.com/bounties#allforone)
3+
title: "[<language>]: <short description>"
4+
labels: [All For One]
5+
body:
6+
- type: markdown
7+
attributes:
8+
value: |
9+
# Introduction
10+
11+
Thank you for submitting a query to the GitHub CodeQL project!
12+
13+
After you submit this issue, the GitHub Security Lab and CodeQL teams will triage the submission and, if it meets the Query Bounty Program requirements, we will grant you a bounty through our HackerOne program.
14+
15+
Please make sure to carefully read the [bounty program description and conditions](https://securitylab.github.com/bounties#allforone)
16+
17+
# Questionnaire
18+
- type: input
19+
id: pr_url
20+
attributes:
21+
label: Query PR
22+
description: Link to pull request with your CodeQL query
23+
placeholder: |
24+
ex. https://github.com/github/codeql/pull/nnnn
25+
validations:
26+
required: true
27+
- type: dropdown
28+
id: language
29+
attributes:
30+
label: Language
31+
description: What programming language is your query written for?
32+
options:
33+
- Java
34+
- Javascript
35+
- GoLang
36+
- Python
37+
- C/C++
38+
- C#
39+
validations:
40+
required: true
41+
- type: textarea
42+
id: cve_ids
43+
attributes:
44+
label: CVE(s) ID list
45+
description: Enter a list of the CVE ID(s) associated with this query, one bullet for each distinct CVE. GitHub will automatically link CVE IDs to the [GitHub Advisory Database](https://github.com/advisories). If the result(s) is **NOT YET** fixed **nor disclosed**, and you are still waiting for a CVE, then you can privately share your result via email to [security@github.com](mailto:security@github.com?subject=[BugBounty]%20Issue%20#000%20useful%20result)
46+
placeholder: |
47+
ex.
48+
- [CVE-20nn-xxxx](<relevant URL>)
49+
- [CVE-20nn-yyyy](<relevant URL>)
50+
validations:
51+
required: true
52+
- type: input
53+
id: cwe
54+
attributes:
55+
label: CWE
56+
description: "[CWE](https://cwe.mitre.org/data/index.html) that best fits the vulnerability class modeled with your query"
57+
placeholder: |
58+
ex. CWE-502: Deserialization of Untrusted Data
59+
validations:
60+
required: false
61+
- type: textarea
62+
id: report
63+
attributes:
64+
label: Report
65+
description: Describe the vulnerability. Provide any information you think will help GitHub assess the impact your query has on the open source community.
66+
placeholder: |
67+
1. What is the vulnerability?
68+
2. How does the vulnerability work?
69+
3. What strategy do you use in your query to find the vulnerability?
70+
4. How have you reduced the number of **false positives**?
71+
5. Other information?
72+
validations:
73+
required: true
74+
- type: checkboxes
75+
id: social
76+
attributes:
77+
label: Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc).
78+
description: We would love to have you spread the word about the good work you are doing
79+
options:
80+
- label: "Yes"
81+
- label: "No"
82+
validations:
83+
required: true
84+
- type: input
85+
id: social_url
86+
attributes:
87+
label: Blog post link
88+
description: If you have already blogged about your query, please provide a link.
89+
validations:
90+
required: false

0 commit comments

Comments
 (0)