If you find a security issue in this Action, please do not open a public GitHub issue. Instead:
- Email the Backblaze security team: security@backblaze.com.
- If the issue is specific to this Action (not a B2 service-level concern), copy the maintainers at opensource@backblaze.com.
Please include:
- A clear description of the vulnerability and the impact you observed.
- Reproduction steps, including the action version (
uses: backblaze-labs/b2-action@<ref>), the inputs that trigger it, and the workflow context. - Any logs you can share after redacting credentials: see the redaction guidance below.
We will acknowledge within 5 business days and provide a remediation timeline once we've reproduced the issue.
This Action calls core.setSecret on:
- The
application-keyinput value. - The B2 authorization token returned by
b2_authorize_account. - Any presigned download URL it emits.
GitHub's workflow runner automatically masks these in the live log. However, if you copy logs to email or a screenshot, that masking does not travel with the text. Before sharing:
- Replace your application key ID and secret with
<REDACTED>. - Replace any URL containing
Authorization=with<REDACTED-URL>. - Strip any
x-bz-content-sha1headers if you consider your content sensitive.
This policy covers the source under src/, the bundled dist/index.js, and the workflows under .github/workflows/. Vulnerabilities in @backblaze/b2-sdk should be reported through that repository's security policy. Vulnerabilities in the B2 service itself should go to security@backblaze.com directly.
- Lost-credential incidents: rotate your application key in the Backblaze B2 console and revoke the leaked one. This Action cannot recover or invalidate a leaked key on your behalf.
- Workflow misconfiguration that grants more access than intended (e.g. using a master application key in a public repo's workflow). Use bucket-scoped, capability-limited application keys.
We aim to coordinate disclosure as follows:
- Day 0: report received and acknowledged.
- Days 1-5: triage and reproduction.
- Days 6-30: fix developed, tested, and prepared for release.
- Day 30-45: coordinated public disclosure alongside a patched release.
We may move faster for high-severity issues or, for low-severity issues, batch the fix into the next regular release.