If you find a vulnerability in this tool itself (the CLI, the aggregator, or our IoC data integrity), please report it privately first:
- Open a GitHub Security Advisory on this repo. This is the preferred channel.
- Or email the maintainer using the email listed on the GitHub profile. Mention "patient-zero security" in the subject line.
We aim to acknowledge reports within 72 hours and to publish a fix or mitigation within 14 days for high-severity issues.
If patient-zero flagged a package or pattern that you've verified is benign:
- Open a regular GitHub Issue (not a security advisory).
- Include: the IoC ID that fired, the artifact it matched, and a link to the upstream source we cited.
- We will remove or scope the entry within 48 hours if the false positive is confirmed.
If you found a malicious package, MCP server, or compromised maintainer account and want it added to our IoC database:
- Open a regular Pull Request adding entries to
data/manual-iocs.json. - See
docs/CONTRIBUTING.mdfor the schema and PR template. - Every entry requires a
primary_external_sourcelink to a published writeup. We do not accept anonymous or unsourced entries.
If the attack is unpublished and disclosure needs to be coordinated, email the maintainer directly first; we will help time the public IoC publication with the disclosure.
patient-zero is a detection-and-triage tool. It does not:
- Block malicious installs (use Aikido Safe Chain or similar for that)
- Provide continuous monitoring (use Snyk, Socket, or osv-scanner in CI)
- Remediate compromised systems
- Replace incident-response procedures
Read docs/RESPONSE.md for what to do after a positive finding.