We take security seriously. If you discover a security vulnerability in AuditAgent, please report it responsibly.
DO NOT open a public GitHub issue for security vulnerabilities.
Instead:
- Email: security@auditagent.io (or create a private security advisory on GitHub)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial response: Within 24 hours
- Status update: Within 72 hours
- Fix timeline: Depends on severity (see below)
Critical (Fix within 24 hours):
- Private key exposure
- Unauthorized fund access
- Remote code execution
High (Fix within 1 week):
- Authentication bypass
- Payment manipulation
- Data exposure
Medium (Fix within 2 weeks):
- Denial of service
- Information disclosure
- Rate limit bypass
Low (Fix in next release):
- UI/UX issues
- Non-sensitive information disclosure
-
Never commit secrets
- Use
.env.localfor sensitive data - Check with
git check-ignore .env.local
- Use
-
Key management
- Generate new keys for production
- Store keys securely (KMS, hardware wallet)
- Rotate keys regularly
-
Testing
- Always test on devnet first
- Never use production keys in tests
- Verify transactions before mainnet
-
Verify payments
- Check x-payment header authenticity
- Validate TAP proofs
- Implement rate limiting
-
Secure endpoints
- Use HTTPS only
- Validate all inputs
- Implement CORS properly
-
Infrastructure
- Use production RPC providers with SLAs
- Enable monitoring and alerts
- Implement backup systems
-
Access control
- Limit who has access to private keys
- Use multi-sig for high-value operations
- Audit access logs regularly
-
Compliance
- Follow all applicable regulations
- Maintain audit trails
- Regular security reviews
Not for production use - Current version is designed for:
- Development and testing
- Proof of concept
- Community feedback
Known limitations:
- No withdrawal functionality
- No spending limits
- No audit by security firm
- In-memory payment logs (not persistent)
We recommend:
- Professional security audit
- Smart contract insurance
- Production key management
- Monitoring infrastructure
- Incident response plan
See docs/PRODUCTION.md for complete checklist.
✅ Authority-based access control
✅ On-chain state validation
✅ Cryptographic TAP proofs
✅ Rent-exempt account checks
✅ Transaction signature verification
- Multi-signature support
- Spending limits and rate controls
- Withdrawal authorization
- Emergency pause functionality
- Time-locked operations
We regularly monitor dependencies for vulnerabilities:
# Check for vulnerabilities
npm audit
# Update dependencies
npm updateCritical dependencies:
@solana/web3.js- Solana interactions@faremeter/payment-solana- Payment handlingnext- Web frameworktweetnacl- Cryptography
After a vulnerability is fixed:
- Security advisory published on GitHub
- CVE assigned (if applicable)
- Update released with patch
- Users notified via GitHub/Discord
- Credit given to reporter (if desired)
Coming soon: We plan to launch a bug bounty program for mainnet deployment.
Potential rewards:
- Critical: $5,000+
- High: $1,000-$5,000
- Medium: $500-$1,000
- Low: Recognition + swag
We'll recognize security researchers who help make AuditAgent more secure.
No reports yet - be the first!
- Security email: security@auditagent.io
- PGP key: [Coming soon]
- GitHub Security: Private advisory
Thank you to the security research community for helping keep AuditAgent secure.
Last updated: December 2024
Next review: Before mainnet launch