We accept security vulnerability reports for the versions listed below. If you are using an older version, please upgrade to the latest supported version before reporting issues.
| Version | Supported |
|---|---|
| 0.0.1 | ✅ |
| < 0.0.1 | ❌ |
If you discover a security vulnerability in the Multi-Streamer Bot, please do not open a public issue. Instead, please report it via:
- Discord: DM
Sythsaz- Discord server: Invite link
We will acknowledge your report within 72 hours and provide an estimated timeline for investigation and resolution.
This bot handles sensitive information (API keys) and interacts with public chat environments. It includes several built-in security mechanisms:
The bot uses AES-256-CBC with a portable, randomized salt to encrypt sensitive configuration values at rest.
- Automatic Encryption: On first run, any plain-text API keys in
config.jsonor streamer.bot global variables are automatically encrypted. - Portable Scope: Keys are encrypted using a salt stored in your config file (
EncryptionSalt). This means:- You CAN move your bot folder to a new PC (it will still work).
- An attacker CANNOT decrypt your keys with just the config file (they need the salt AND the context of the running application).
- Protection: This prevents API keys from being stolen if the configuration file is accidentally shared without the salt or committed to version control.
To prevent bot recursion and infinite loops:
- The bot inserts a zero-width space configuration token into its own output messages.
- It detects this token in incoming messages and ignores them, preventing it from triggering itself.
This bot implements several validation layers:
- Entropy Checks: Uses Shannon entropy analysis to detect random "keyboard smash" usernames typically used by mass-entry bots.
- Account Age Verification: Configurable
MinAccountAgeDaysprevents brand new accounts from entering. - Username Patterns: Regex-based validation (
UsernamePattern) to enforce community naming standards.
- Never commit
config.jsonto public repositories if it contains unencrypted keys. - Rotate your API keys immediately if you suspect they have been compromised.
- Use "Mirror" RunMode cautiously, as it syncs data between file system and global variables.
In the event of a confirmed vulnerability:
- We will issue a patch release immediately.
- We will publish a security advisory detailing the impact and mitigation.
- We will credit the reporter (with permission).