doordash-cli is an unofficial integration against DoorDash consumer-web traffic. Security work here is mostly about keeping the CLI cart-safe, protecting local auth/session state, and avoiding unsafe command expansion.
Security fixes are targeted at:
- the latest release on npm
- the current
mainbranch
Older releases may receive guidance, but fixes are not guaranteed to be backported.
Please do not open a public issue with exploit details for security-sensitive findings.
Preferred path:
- Use GitHub's private vulnerability reporting / repository security advisory flow for this repository if it is available to you.
- If you cannot use that flow, contact the maintainer privately via the contact path linked from https://github.com/LatencyTDH / https://seand.ai.
- If you still cannot reach the maintainer privately, open a minimal public issue that says you have a security report and need a private contact channel — but do not include reproduction steps, tokens, cookies, raw payloads, or exploit details.
Include as much of the following as you safely can:
- affected version / commit
- impact summary
- reproduction steps
- whether the issue requires local machine access, an authenticated DoorDash session, or a malicious payload
- whether sensitive data may have been exposed
- any suggested fix or mitigation
Examples of security-relevant issues for this repo:
- bypasses of the cart-safe command or payload boundaries
- checkout/payment/order-mutation functionality becoming reachable unintentionally
- credential, cookie, or persisted session leakage
- unsafe browser-session import behavior
- command injection, path traversal, or packaging/release artifact tampering
- logs or error output that expose secrets or highly sensitive data
These are generally not treated as repo security bugs unless they create a concrete vulnerability in doordash-cli itself:
- upstream DoorDash anti-bot changes or schema drift
- ordinary install/setup failures
- feature requests for broader command coverage
- reports that require risky production use outside the documented cart-safe surface
Please keep research responsible and minimal:
- do not attempt checkout, payment, cancellation, or other irreversible order actions
- do not access data that is not yours
- do not exfiltrate tokens, cookies, or personal data
- do not use excessive automation that could degrade third-party systems
The maintainer will try to:
- acknowledge a good-faith report promptly
- confirm whether the issue is accepted / reproducible
- coordinate a fix and reasonable disclosure timing
Please give the maintainer time to investigate and patch before publishing details.
If you are unsure whether something is security-sensitive, err on the side of private reporting first.