| Version | Supported |
|---|---|
| 1.0.x | ✅ Yes |
| < 1.0 | ❌ No |
If you discover a security vulnerability in Likelihoodlum, please report it responsibly.
- Vulnerabilities in how GitHub tokens are handled or stored
- Issues with the
.envfile parsing that could leak credentials - Injection risks via repository names, commit messages, or API responses
- Any way the tool could be used to exfiltrate data
Do NOT open a public issue for security vulnerabilities.
Instead, please email: gotnull@users.noreply.github.com
Include:
- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if you have one)
- Acknowledgment within 48 hours
- Assessment within 7 days
- Fix or mitigation as quickly as possible, depending on severity
- Credit in the changelog and release notes (unless you prefer anonymity)
Likelihoodlum handles GitHub Personal Access Tokens. The tool follows these practices:
- Tokens are never logged, printed, or written to disk by the tool
- The
.envfile is gitignored by default - Tokens passed via
--tokenmay appear in shell history — using.envorGITHUB_TOKENenv var is recommended - All API requests use HTTPS
- No data is sent anywhere other than the GitHub API
This policy covers the likelihoodlum Python tool and its repository. It does not cover:
- The GitHub API itself
- Third-party dependencies (e.g.
python-dotenv, which is optional) - Your own GitHub token's security — that's between you and GitHub