Field Note 03 – Vendor Notice
I sent the private disclosure.
The private report needed to be useful to the vendor without being performative. I included the details required to identify, reproduce, and remediate the issue, including sensitive values that would never belong in a public post.
The report focused on what the vendor needed: affected application package, observed affected builds, source locations, target bucket, region, endpoint, and the credential values required for them to identify and revoke the key.
I also described my research limit. The finding was based on APK static analysis and decompiled code review only. No live AWS validation was performed.
That separation matters. The vendor needs enough detail to remediate. The public does not need enough detail to reuse the credential.
A good disclosure report makes the vendor’s next action obvious: revoke the exposed key, review logs, replace the pattern, and verify that newer builds no longer ship the secret.
