Skip to content

Commit de24191

Browse files
authored
Merge pull request #507 from github/bug-slayer-form
Bug-slayer-form
2 parents b36e194 + 2412001 commit de24191

2 files changed

Lines changed: 66 additions & 26 deletions

File tree

.github/ISSUE_TEMPLATE/bug-slayer.md

Lines changed: 0 additions & 26 deletions
This file was deleted.
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
name: The Bug Slayer bounty submission
2+
description: Submit a CodeQL query for the Bug Slayer bounty (https://securitylab.github.com/bounties)
3+
title: "[<language>]: <short description>"
4+
labels: [The Bug Slayer]
5+
body:
6+
- type: markdown
7+
attributes:
8+
value: |
9+
# Introduction
10+
11+
Thank you for your submission to the bounty program!
12+
13+
After you submit this issue, the GitHub Security Lab and CodeQL teams will triage the submission and, if it meets the Query Bounty Program requirements, we will grant you a bounty through our HackerOne program.
14+
15+
Please make sure to carefully read the [bounty program description and conditions](https://securitylab.github.com/bounties/)
16+
17+
# Questionnaire
18+
- type: textarea
19+
id: cve_ids
20+
attributes:
21+
label: CVE(s) ID list
22+
description: Enter a list of the CVE ID(s) associated with this query, one bullet for each distinct CVE. You need at least four high severity CVEs or two critical severity CVEs.
23+
placeholder: |
24+
ex.
25+
- [CVE-20nn-xxxx](<relevant URL>)
26+
- [CVE-20nn-yyyy](<relevant URL>)
27+
validations:
28+
required: true
29+
- type: input
30+
id: a41_url
31+
attributes:
32+
label: All For One submission
33+
description: Link to the All For One submission with your CodeQL query
34+
placeholder: |
35+
ex. https://github.com/github/securitylab/issues/nnn
36+
validations:
37+
required: true
38+
- type: textarea
39+
id: details
40+
attributes:
41+
label: Details
42+
description: Detail here how you found each CVE with your query. You can provide LGTM results, links to codeql DBs, ... anything that demonstrates that your query finds each CVE.
43+
placeholder: |
44+
ex.
45+
- link/to/my/lgtm/runs
46+
- link/to/gist/with/modified/query
47+
- link/to/codeql/db
48+
validations:
49+
required: true
50+
- type: checkboxes
51+
id: social
52+
attributes:
53+
label: Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc).
54+
description: We would love to have you spread the word about the good work you are doing
55+
options:
56+
- label: "Yes"
57+
- label: "No"
58+
validations:
59+
required: true
60+
- type: input
61+
id: social_url
62+
attributes:
63+
label: Blog post link
64+
description: If you have already blogged about your query, please provide a link.
65+
validations:
66+
required: false

0 commit comments

Comments
 (0)