If you discover a security vulnerability in this repository (website, scripts, github actions, etc.), please report it responsibly:
Preferred Method: Open a GitHub Security Advisory
Alternative: Email the maintainers with details about the vulnerability. Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
Please do not:
- Open public issues for security vulnerabilities
- Share vulnerability details publicly before a fix is available
This repository documents AWS IAM privilege escalation techniques for defensive and educational purposes.
If you discover a new AWS privilege escalation path:
- Consider responsible disclosure to AWS first (though AWS generally considers IAM misconfigurations to be customer responsibility)
- Once appropriate, submit a pull request to document the path
- Follow our contribution guidelines
- Ensure proper attribution to the original researcher
If you find an error in documented paths:
- Open a regular GitHub issue or pull request
- These are not security vulnerabilities but documentation corrections
We accept security reports for:
- ✅ The current version of the website and documentation
- ✅ All Python validation scripts
- ✅ GitHub Actions workflows
When contributing to this project:
- Never commit AWS credentials, tokens, or secrets
- Use
.gitignorefor sensitive local configuration - Validate all YAML input with provided validation scripts
- Follow secure coding practices in Python scripts
In Scope:
- Website vulnerabilities (XSS, injection, etc.)
- CI/CD security issues
- Credential exposure in repository
- Malicious code injection risks
Out of Scope:
- Theoretical AWS privilege escalation paths (these should be PRs)
- Issues with AWS services themselves (report to AWS)
- Misuse of documented techniques by third parties
We appreciate responsible security research and will:
- Credit researchers in fix commits and releases (with permission)
- Respond promptly to all valid reports
- Work with you on coordinated disclosure timelines
Thank you for helping keep pathfinding.cloud secure!