ICEBlock handled my vulnerability report in the worst possible way
Quality of the vulnerability report
- Many commenters say the “report” is extremely low quality: essentially an nmap scan, a version string, and a link to a CVE, with no verification that the issue is exploitable in this deployment.
- Several argue this is indistinguishable from the flood of automated “beg bounty” emails and scanner noise that large orgs routinely ignore.
- Others counter that even a weak report should still be handled professionally by the app developer.
Is Apache actually vulnerable?
- Multiple people note that version strings on Linux distros are misleading: RHEL/Debian/Ubuntu often backport security fixes while keeping the old version number, so “Apache 2.4.57” doesn’t prove unpatched CVEs.
- Some highlight that the cited CVE is highly situational (requires specific reverse-proxy / header-manipulation conditions) and there’s no evidence those conditions exist for ICEBlock.
- A minority argue that outdated apparent versions are still a strong “brown M&M” signal of broader security rot.
Disclosure process and timelines
- Several think giving 90 minutes before publishing the first critical post, and a one-week ultimatum before the second, is unreasonable and not “responsible disclosure.”
- Others emphasize the distinction between “responsible” and “coordinated” disclosure and push back on vendor-centric norms, but still see the execution here as more “gotcha” than collaboration.
Tone, criticism, and blocking
- Many criticize the reporter’s tone: leading with a harsh “activism theater” takedown, interleaving moral critique with a vague security warning, and generally coming off as hostile.
- Others argue criticism of the app’s concept and implementation is substantively fair, even if strategically unhelpful for getting fixes.
- Some see the developer’s blocking behavior (especially toward security reports) as immature and dangerous; others defend blocking as self‑protection amid harassment.
ICEBlock’s purpose and threat model
- One camp views the app as harmful “activism/security theater” and potentially an unintentional honeypot: closed source, hosted on a US VPS, vulnerable to subpoenas and false reports.
- Another camp argues that even a limited app can be impactful, pointing to strong government backlash as evidence it’s more than “theater.”
- Several note that, given the adversary (federal agencies), merely patching CVEs is far from sufficient; the entire architecture and data-collection model are suspect.
Broader context: vuln-report fatigue
- Commenters repeatedly mention being inundated with bogus or low-effort vulnerability emails (automated scans, SPF nitpicks, irrelevant CVEs) which makes it harder for genuine reports to be heard.
- Some conclude that in this incident “no one looks good”: a fragile, high‑risk app run by an underqualified dev, and a critic whose disclosure approach and technical rigor are both questioned.