Submissions Round 1
Thank you for the first round of submissions! As part of our commitment to transparency, we will be sharing bug-finding attempts here (where no additional risk is posed) alongside our response and/or mediation.
Participants' identity will be anonymized. Submissions made here will also disqualify identical submissions made afterwards.
Submission 1 | Track 1
Leaked API Keys in API Service Respository Evidence of two exposed API keys found in the commit history of api-service. Auto-detected by Gitleaks on a local VPS. Response: Negative – misinterpretation of strings
Hard-coded JWT for Airdrop values in Dashboard
Hard-coded JWT tokens and API-like keys in nuxt.config.ts for Supabase.
Response: Not a secrets leakage as it has the anon service role and points to public data. However, this JWT could be stored as a deploy secret, good find!
Unnecessary private key and certificate included in test data Ran Gitleaks full-history scan. Repository: anyone-protocol/sbws. Response: Negative. We accept tests working out of the box with the same keys.
Private TLS key included in test directory Ran Gitleaks full-history scan. Detected PEM format private key. Response: Negative. We accept tests working out of the box with the same keys.
Leaked private signing keys inside Docker example directories Ran Gitleaks full-history scan. Detected PEM format keys in Docker example directories. Response: Negative. We accept tests working out of the box with the same keys.
Submission 2 | Track 2
Publicly reachable service at containers.ops.anyone.tech Passive reconnaissance scan of *.ops.anyone.tech to collect HTTP status codes and final redirect targets. Response: The containers are inherently setup as public. This track would have looked for a bypass of the oauth_proxy.
CORS misconfiguration on api.ec.anyone.tech During passive recon of public Anyone endpoints discovered via crt.sh, exposing a wildcard CORS policy. Response: Setup for the use by certain services, but this is not ideal practice. Needs review.
Prize: While this attempt did not strictly find a high-risk vulnerability, this was a thorough attempt making use of Gitleaks. The submitter will be contacted to receive a small prize!
Submission 3 | Track 1
Leaked APIKey of Supabase
Manual repository review, found API key that allows public query
Response: Not a secrets leakage as it has the anon service role and points to public data. However, this JWT could be stored as a deploy secret, good find as above!
Last updated