Do not open a public issue for suspected security vulnerabilities.
SkillBridge uses GitHub's Private Vulnerability Reporting. File a private report from the repo's Security tab → "Report a vulnerability" — this routes directly to the maintainer and keeps the details out of public view until a fix lands.
If GitHub Private Vulnerability Reporting is unavailable for any reason (corporate proxy, account lockout, etc.), open an issue titled "Security disclosure request" with no details — the maintainer will respond with an alternate intake channel within 72 hours.
- Translation pipeline — anything that could leak user lesson
content, exam answers, or chat history outside the user's browser
beyond the documented
Google Translate / Puter.jsendpoints (README — Privacy & Security, PRIVACY_POLICY.md). - Content-script injection — XSS, CSP bypass, prototype pollution,
or any path through translator output that lets remote content reach
innerHTMLwithout escaping (src/lib/gemini-block.jsescapeHtmlis the single chokepoint — bugs there are critical). - Exam-mode safety bypass — anything that lets the extension
translate proctored exam content or quiz answer choices in
violation of the "Things we will not do" section of
POSITIONING.md. - Supply-chain compromise — tampering with
src/bridge/puter.js(hash-checked by.github/workflows/maintenance.yml), an npm devDependency, or a GitHub Action used in this repo. - Secret exposure — any path where
CWS_*/AMO_*credentials could leak from workflow logs or artifacts.
- Bugs in Anthropic Academy itself (report to Anthropic).
- Bugs in third-party services SkillBridge calls (Google Translate, Puter.js — report to those vendors).
- Reports that depend on the user manually pasting malicious content
into the AI Tutor chat — that input is treated as untrusted by
design and rendered through
escapeHtml; an LLM hallucinating in response is a UX issue, not a vulnerability. - Theoretical browser-engine bugs in Chrome / Firefox / Edge — report to the browser vendor.
- Acknowledge: within 72 hours of a complete Private Vulnerability Report.
- Initial triage (confirm/reject + severity): within 7 days.
- Patch + release for confirmed criticals: within 14 days. Lower severity findings are scheduled into the normal release cadence and noted in the published advisory.
- Public disclosure: coordinated with the reporter via the
GHSA. Default embargo is until the fix is published in a release
build that is live on at least one store (currently: the manual
developer-mode install path, since the Chrome Web Store listing is
pending re-publication after icon redesign — see
README.md).
Researchers credited in published advisories on this repo (via the GHSA), listed publicly only with the researcher's explicit consent.
- Source:
git tagof the formvX.Y.Zonmain, signed by the GitHub-issued release token (release.yml). - Chrome Web Store zip: SLSA build provenance attestation is generated
for each CWS upload (
actions/attest-build-provenancestep incd.yml). Verify viagh attestation verify. - Bundled Puter.js (
src/bridge/puter.js): SHA-256 hash recorded inTHIRD_PARTY_NOTICES.md; verified weekly bymaintenance.ymldependency-auditjob, which opens an issue on mismatch.