I don't want to draw any attention to it in a bug report and I'm not sure it's OK to dig up email addresses from commit logs either.
It also got me thinking: why don't we have a Bug Bounty-like program for Open Source projects as a whole. What I mean is somewhere where we can post sensitive bugs (even for no pay) and have someone who knows what they're doing guide the process of reporting it responsibly. I know some big projects have this, but e.g. look at the mountain of dependencies that most projects are built on - many of them barely maintained.
By all means, grab emails from commit logs, email the authors. I do it all the time and they most certainly appreciate the opportunity to fix an embarrassing bug before the entire OS community is aware of it.
If the vulnerability is really severe, you could also report it to US-CERT; they can walk it through the coordination process for you, even anonymously.
https://www.opensourcesecuritypodcast.com/2019/12/episode-17...
Otherwise, try to go through the CVE process so that redistributors of the project (such as Debian or RedHat) fix the issue in their copies of the project:
For a small project I think it's perfectly fine if you feel this DOS attack is a legitimate concern.
In this case, yes. Dig up any info to try to contact the author privately.
There are dozens of bounty like programs but authors have to opt-in to those.
You could also make a fork, with one commit to fix that issue publish with no fanfare. Then at least the fix is out there.
He had identified that my 2FA was off and that my password had been leaked in a hack. He was able to prove to me that he was able to update the source of my projects and publish to npm.
I was initially terrified and massively taken aback. I quickly 2FA-ed all the things and I remain very grateful for the report.
Send the email. The MIA problem is tricky; if there's no maintainer (and you don't want to fork, fix and become a maintainer) then I'm not sure what you can do.
A little more context:
This project is a library that can appear in internet-facing servers and when the bug is triggered, the process can proceed to consume 100% CPU.
In my case I found it due to bots, but they only triggered it by accident.
It is important everyone who is using the software is aware of any issues right away so that they can patch it themselves if they need to. It is also important that the maintainers of forks are not disadvantaged.
Remember, after all the maintainer of the "original" could be a malicious actor, or it could be possible that they were replaced by one such malicious actor.