| Version | Supported |
|---|---|
| 1.2.x | ✅ |
| < 1.2 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
Creating a public issue could expose users to the vulnerability before it's fixed.
Send an email to security@lazor.sh with the following information:
- Subject:
[SECURITY] Vulnerability in @lazorkit/wallet-mobile-adapter - Description: Detailed description of the vulnerability
- Steps to reproduce: Clear steps to reproduce the issue
- Impact: Potential impact on users
- Suggested fix: If you have a suggested solution
- We will acknowledge receipt within 24 hours
- We will investigate and provide updates
- We will work on a fix and coordinate disclosure
- We will credit you in the security advisory (if desired)
This SDK handles WebAuthn authentication which involves:
- Biometric authentication (Face ID, Touch ID, fingerprint)
- Private key generation and storage
- Cryptographic signatures
Best practices:
- Always use HTTPS in production
- Verify the authenticity of service URLs
- Implement proper error handling
- Never log sensitive authentication data
The SDK creates and manages smart wallets on Solana:
- Smart contract wallet creation
- Transaction signing and execution
- Fee sponsorship through paymaster
Best practices:
- Verify smart contract addresses
- Use trusted RPC endpoints
- Implement transaction confirmation checks
- Monitor for suspicious activity
Wallet data is stored using AsyncStorage:
- Wallet credentials and state
- Authentication tokens
- Configuration data
Best practices:
- Implement secure storage encryption if needed
- Clear sensitive data on logout
- Use secure key derivation
- Consider additional encryption for high-security applications
Before using this SDK in production:
- Verify package authenticity:
npm auditand check package signatures - Review source code: Ensure no malicious code is present
- Use HTTPS: WebAuthn requires secure connections
- Implement proper error handling: Don't expose sensitive information
- Use environment variables: Don't hardcode sensitive URLs
- Enable debug mode only in development
- Implement proper logout: Clear sensitive data
- Monitor for updates: Keep the package updated
- Test thoroughly: Verify all wallet operations work correctly
- Have a security incident response plan
- Type Safety: Full TypeScript support prevents type-related vulnerabilities
- Error Boundaries: Proper error handling prevents crashes
- Input Validation: All inputs are validated before processing
- Secure Storage: Uses AsyncStorage with proper key management
- HTTPS Enforcement: WebAuthn operations require secure connections
- Regular dependency updates
- Automated security scanning
- Manual code reviews
- Third-party security assessments (planned)
- Security Email: security@lazor.sh
- General Support: support@lazor.sh
- Website: https://lazor.sh
- GitHub: https://github.com/lazorkit/wallet-mobile-adapter
- Day 0: Vulnerability reported
- Day 1: Acknowledgment and initial assessment
- Day 7: Status update and timeline
- Day 30: Fix development and testing
- Day 45: Patch release and disclosure
Timeline may vary based on vulnerability complexity and severity.
We currently do not have a formal bug bounty program, but we do appreciate security researchers who responsibly disclose vulnerabilities. Contributors may be acknowledged in our security advisories and documentation.
Remember: Security is everyone's responsibility. If you see something, say something!