Skip to content

Security: lazor-kit/wallet-mobile-adapter

SECURITY.md

Security Policy

Supported Versions

Version Supported
1.2.x
< 1.2

Reporting a Vulnerability

We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:

1. DO NOT create a public GitHub issue

Creating a public issue could expose users to the vulnerability before it's fixed.

2. Report privately

Send an email to security@lazor.sh with the following information:

  • Subject: [SECURITY] Vulnerability in @lazorkit/wallet-mobile-adapter
  • Description: Detailed description of the vulnerability
  • Steps to reproduce: Clear steps to reproduce the issue
  • Impact: Potential impact on users
  • Suggested fix: If you have a suggested solution

3. What happens next

  • We will acknowledge receipt within 24 hours
  • We will investigate and provide updates
  • We will work on a fix and coordinate disclosure
  • We will credit you in the security advisory (if desired)

Security Considerations

WebAuthn/Passkey Security

This SDK handles WebAuthn authentication which involves:

  • Biometric authentication (Face ID, Touch ID, fingerprint)
  • Private key generation and storage
  • Cryptographic signatures

Best practices:

  • Always use HTTPS in production
  • Verify the authenticity of service URLs
  • Implement proper error handling
  • Never log sensitive authentication data

Smart Wallet Security

The SDK creates and manages smart wallets on Solana:

  • Smart contract wallet creation
  • Transaction signing and execution
  • Fee sponsorship through paymaster

Best practices:

  • Verify smart contract addresses
  • Use trusted RPC endpoints
  • Implement transaction confirmation checks
  • Monitor for suspicious activity

Data Storage Security

Wallet data is stored using AsyncStorage:

  • Wallet credentials and state
  • Authentication tokens
  • Configuration data

Best practices:

  • Implement secure storage encryption if needed
  • Clear sensitive data on logout
  • Use secure key derivation
  • Consider additional encryption for high-security applications

Security Checklist for Users

Before using this SDK in production:

  • Verify package authenticity: npm audit and check package signatures
  • Review source code: Ensure no malicious code is present
  • Use HTTPS: WebAuthn requires secure connections
  • Implement proper error handling: Don't expose sensitive information
  • Use environment variables: Don't hardcode sensitive URLs
  • Enable debug mode only in development
  • Implement proper logout: Clear sensitive data
  • Monitor for updates: Keep the package updated
  • Test thoroughly: Verify all wallet operations work correctly
  • Have a security incident response plan

Known Security Features

Built-in Protections

  • Type Safety: Full TypeScript support prevents type-related vulnerabilities
  • Error Boundaries: Proper error handling prevents crashes
  • Input Validation: All inputs are validated before processing
  • Secure Storage: Uses AsyncStorage with proper key management
  • HTTPS Enforcement: WebAuthn operations require secure connections

Security Audits

  • Regular dependency updates
  • Automated security scanning
  • Manual code reviews
  • Third-party security assessments (planned)

Contact Information

Responsible Disclosure Timeline

  • Day 0: Vulnerability reported
  • Day 1: Acknowledgment and initial assessment
  • Day 7: Status update and timeline
  • Day 30: Fix development and testing
  • Day 45: Patch release and disclosure

Timeline may vary based on vulnerability complexity and severity.

Bug Bounty

We currently do not have a formal bug bounty program, but we do appreciate security researchers who responsibly disclose vulnerabilities. Contributors may be acknowledged in our security advisories and documentation.


Remember: Security is everyone's responsibility. If you see something, say something!

There aren’t any published security advisories