We take the security of your financial data and the integrity of our open-source code seriously. Because this app handles sensitive information via SMS and MBOX, we are committed to a "Zero-Knowledge" architecture and a transparent security model.
We only provide security updates for the latest stable release. Please ensure you are running the most recent version of the app before reporting a vulnerability.
Do not open a public GitHub Issue for security vulnerabilities.
If you discover a security flaw related to our Biometric locking, local database encryption, or the Regex parsing engine, please follow these steps:
-
Private Disclosure: Email us at security@your-domain.com with the subject line Vulnerability Report: [Short Description].
-
Details to Include:
-
A description of the vulnerability and its potential impact.
-
Step-by-step instructions to reproduce the issue.
-
The platform (Android/iOS/Desktop/Web) and version affected.
-
(Optional) Any suggested fix or mitigation.
-
-
Response Time: We will acknowledge your report within 48 hours and provide a timeline for a fix.
To help researchers, here is a summary of our core security assumptions:
-
Zero-Knowledge: No transaction data should ever leave the device. Any network call sending personal spend data is considered a high-priority bug.
-
Hardware-Backed Encryption: We use SQLCipher and the Android Keystore / iOS Keychain. The app assumes that if the hardware's "Trusted Execution Environment" (TEE) is compromised, the data is at risk.
-
Biometric Integrity: We rely on native system prompts. Any bypass that allows viewing spend data without a successful biometric/PIN challenge is a critical vulnerability.
-
Submodule Sanitization: Our Python-based data pipeline is designed to catch "troll" data. Any exploit that allows a malicious user to inject executable code or crash-inducing strings into the app via the rewards submodule is a valid report.
We follow the principle of Coordinated Vulnerability Disclosure. We ask that you give us a reasonable amount of time to fix the issue before making it public. In return, we promise to:
-
Keep you updated on our progress.
-
Credit you in our [CHANGELOG.md] and TechnoFino updates (unless you wish to remain anonymous).
-
Protects Your Users: If someone finds a way to bypass your Biometric lock, you want to fix it before the public knows about it.
-
Professionalism: A SECURITY.md file is a hallmark of a mature open-source project. It tells your contributors that you have a plan for when things go wrong.
-
Researcher Friendly: Most "white hat" hackers look for this file first to see if you are open to responsible disclosure.