This is a research archive. There is no running service, no login system, no user data. The attack surface is the data itself and the toolkit scripts.
Security issues relevant to this repo fall into two categories:
- Data integrity issues — corrupted, tampered, or injected content in lexicon files, research logs, or toolkit outputs
- Code vulnerabilities — exploitable bugs in the Rohonc Toolkit scripts (Python decoder, frequency analyzer, etc.)
Do not open a public issue for security vulnerabilities.
Report privately:
- Email: lackadaisicalresearch@pm.me
- XMPP+OTR: thelackadaisicalone@xmpp.jp (preferred for sensitive disclosures)
Include in your report:
- What the issue is, stated plainly
- Which file(s) or script(s) are affected
- Steps to reproduce or trigger the problem
- What you believe the impact is
- If you have a proposed fix, include it
- Acknowledgement within 7 days if we agree it's a valid issue
- Assessment of severity and scope
- Fix developed and tested
- Fix released with a note in the relevant changelog
- Credit given to the reporter unless anonymity is requested
No bug bounties. No CVE filings (this is not a product). No coordinated disclosure theater.
If it's real and it matters, it gets fixed. That's the deal.
The lexicon files and research logs are the primary research outputs. Tampering with these is the highest-severity issue in this repo.
If you find evidence of:
- Unexpected modifications to JSON lexicon files
- Injected or altered content in research phase logs
- Hash mismatches in toolkit outputs
Report it immediately using the contact channels above.
The toolkit scripts process local files only — no network calls, no external API dependencies, no credential handling. Risk surface is limited to:
- Path traversal in file input arguments
- Malformed input causing unexpected behavior in the decoder or frequency analyzer
- Dependency vulnerabilities in any Python packages used
If you find any of these, report as above. Patches welcome via CONTRIBUTING.md.
- Disagreements with the decipherment methodology
- Theoretical challenges to the linguistic conclusions
- Criticism of the research approach
Those belong in issues or discussions, not security reports.
We run a tight operation. If you find something real:
- Give us reasonable time to fix it before going public
- Don't use the vulnerability to access, modify, or distribute data you shouldn't have
- Don't burn the repo just to make a point
In exchange: we'll fix it, credit you, and not waste your time with lawyers.
Fair trade.
"Find it. Report it. Fix it. That's the whole process."
Lackadaisical Security - Linguistics Division
- Website: https://lackadaisical-security.com
- Email: lackadaisicalresearch@pm.me