The Protocol Injection Payload List project is committed to maintaining the security and integrity of this repository while promoting responsible security research and ethical testing practices.
This security policy covers:
- Repository Security: Issues with the repository infrastructure, documentation, or files
- Payload Safety: Concerns about payloads that could cause unintended harm
- Documentation Accuracy: Security-related errors in documentation
- Ethical Concerns: Payloads or content that violate ethical security practices
The following are NOT covered by this policy:
- Vulnerabilities found using these payloads on third-party systems
- Security issues in external systems or applications
- General security questions or support requests
- Reports about known injection vulnerabilities (this is the purpose of the project)
If you discover a security issue related to this repository, please report it responsibly.
Please report:
- Critical Payloads: Payloads that could cause immediate, severe harm
- Repository Vulnerabilities: Security issues with GitHub repository settings or files
- Malicious Content: Intentionally harmful or malicious payloads
- Privacy Concerns: Payloads containing sensitive information (API keys, credentials, etc.)
- Documentation Flaws: Security misinformation that could lead to harm
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, use one of these secure methods:
-
GitHub Security Advisory (Preferred)
- Navigate to the "Security" tab
- Click "Report a vulnerability"
- Fill out the private security advisory form
-
Email Report
- Send details to the repository maintainers
- Include "SECURITY" in the subject line
- Use encrypted email if possible (PGP)
-
Private Message
- Contact maintainers directly through GitHub
- Request a private discussion channel
Please include:
Subject: [SECURITY] Brief Description
Description:
- Clear description of the security issue
- Affected files or payloads
- Potential impact and severity
- Steps to reproduce (if applicable)
- Suggested remediation (optional)
Environment:
- Repository version/commit
- How you discovered the issue
Contact:
- Your preferred contact method
- Availability for follow-up questions
- Acknowledgment: We will acknowledge receipt within 72 hours
- Investigation: We will investigate all legitimate reports promptly
- Communication: We will keep you informed of our progress
- Resolution: We will work to resolve issues quickly and effectively
- Credit: We will credit reporters (unless anonymity is requested)
- 72 hours: Initial acknowledgment
- 7 days: Preliminary assessment and severity classification
- 30 days: Target resolution for critical issues
- 90 days: Public disclosure (coordinated with reporter)
| Level | Description | Response Time |
|---|---|---|
| Critical | Immediate severe harm possible | 24-48 hours |
| High | Significant security impact | 7 days |
| Medium | Moderate security concern | 30 days |
| Low | Minor issue with limited impact | 60 days |
Before Testing:
β DO:
- Obtain explicit written authorization
- Test only systems you own or have permission to test
- Use appropriate test environments
- Follow responsible disclosure practices
- Comply with all applicable laws and regulations
- Document your testing activities
- Report vulnerabilities responsibly
β DO NOT:
- Test systems without authorization
- Perform testing that could cause harm or disruption
- Use payloads for malicious purposes
- Violate laws, regulations, or terms of service
- Share exploits publicly before responsible disclosure
- Automate testing without proper controls
Users must comply with:
- Computer Fraud and Abuse Act (CFAA) - United States
- Computer Misuse Act - United Kingdom
- Convention on Cybercrime - International
- Local and national computer crime laws
- Terms of Service of target systems
- Bug bounty program rules (if applicable)
- Authorization First: Always get permission before testing
- Do No Harm: Avoid actions that could damage systems or data
- Responsible Disclosure: Report vulnerabilities to appropriate parties
- Privacy Respect: Protect sensitive information discovered during testing
- Professional Conduct: Maintain ethical standards in all security activities
When contributing to this repository:
- Review Payloads: Ensure payloads are safe for authorized testing
- Avoid Credentials: Never include real credentials, API keys, or tokens
- Document Risks: Clearly document any potentially dangerous payloads
- Test Safely: Only test in isolated, controlled environments
- Sanitize Data: Remove any sensitive information before committing
Repository maintainers will:
- Review Contributions: Carefully review all submissions for safety
- Monitor Issues: Watch for security-related reports
- Update Regularly: Keep security documentation current
- Educate Users: Provide clear guidance on responsible use
- Respond Promptly: Address security concerns quickly
- Limited write access to trusted maintainers
- Two-factor authentication required
- Protected main branch with required reviews
- Signed commits encouraged
All contributions undergo:
- Manual review by maintainers
- Duplicate detection
- Safety assessment
- Format validation
- Documentation verification
We monitor for:
- Unauthorized changes
- Malicious payload additions
- Compromised accounts
- Suspicious activity
- Copyright violations
If you discover a vulnerability in a third-party system using payloads from this repository:
-
Do not report it to us - We are not responsible for vulnerabilities in other systems
-
Follow responsible disclosure:
- Contact the affected organization directly
- Use their security contact or bug bounty program
- Allow reasonable time for patching (typically 90 days)
- Coordinate public disclosure with the vendor
-
Document your findings:
- Keep detailed records of your testing
- Note which payloads were effective
- Document the vulnerability clearly
-
Share knowledge (after disclosure):
- Consider submitting improved payloads
- Help the security community learn
- Respect NDAs and disclosure agreements
- OWASP Vulnerability Disclosure Cheat Sheet
- ISO 29147 - Vulnerability Disclosure
- CERT Guide to Coordinated Vulnerability Disclosure
We thank the security community for:
- Responsible disclosure of issues
- Contributions to improve security
- Feedback on payloads and documentation
- Promoting ethical security practices
Security researchers who have helped improve this project:
- (Contributors will be listed here)
For security-related inquiries:
- Security Issues: Use GitHub Security Advisory
- General Questions: Open a public discussion
- Urgent Matters: Contact maintainers directly
This security policy may be updated periodically. Check the commit history for changes.
Last Updated: 2024
Version: 1.0
Remember: Security is everyone's responsibility. By using this repository responsibly, you contribute to a safer digital ecosystem.
Thank you for helping keep this project secure and ethical!