This project is a local multi-bot orchestration stack for Telegram on macOS.
Security-sensitive areas include:
- token handling
- local env generation
- launchd service generation
- local file permissions
- memory and runtime state storage
If you discover a security issue, do not open a public issue with exploit details first.
Instead:
- Prepare a short description
- Include reproduction steps if possible
- State whether secrets, tokens, or local file access are involved
- Report it privately to the maintainer
Examples:
- token leakage
- secrets written into generated files or logs
- unsafe default permissions
- arbitrary code execution through generated config
- unsafe path handling that could overwrite unintended files
- unintended cross-bot memory exposure
Examples:
- general install questions
- feature requests
- cosmetic documentation issues
- requests for new integrations
Those should go through normal issues or pull requests.
When contributing:
- never commit real tokens
- never paste
.envsecrets into issues or pull requests - never include private machine paths that expose sensitive local structure beyond what is necessary
- prefer sanitized examples and placeholders
If you think secrets may have been exposed:
- rotate the affected Telegram bot tokens immediately
- remove local generated env files if needed
- check launchd-generated env files and logs
- review
.bot_tokens.env - re-run local setup with sanitized values
Before publishing changes, double-check:
.bot_tokens.envis not staged- no runtime sqlite files are staged
- no generated logs are staged
- docs use placeholder paths where appropriate