The Navin team takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
- Open a public GitHub issue for security vulnerabilities
- Disclose the vulnerability publicly before it has been addressed
Report security vulnerabilities to: navinxmr@gmail.com
OR
Reach out to: dinahmaccodes on Telegram
Telegram GC link: Telegram Group Chat
When reporting a vulnerability, please include:
- Description: A clear description of the vulnerability
- Impact: What could an attacker achieve by exploiting this?
- Reproduction: Step-by-step instructions to reproduce the issue
- Proof of Concept: Code or screenshots demonstrating the vulnerability
- Suggested Fix: If you have ideas on how to fix it (optional)
- Acknowledgment: Within 72 hours of report
- Initial Assessment: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 24-48 hours
- High Priority: 7 days
- Medium Priority: 30 days
- Low Priority: 90 days
We currently support security updates for:
| Version | Supported |
|---|---|
| 0.x.x | ✅ |
- Never commit secrets: No private keys, API keys, or passwords
- Use
require_auth(): Always validate caller authorization - Check arithmetic: Use checked operations to prevent overflows
- Validate inputs: Always validate external inputs
- Test edge cases: Include security-focused tests
- Review dependencies: Keep dependencies updated
Before major releases:
- Internal security review
- Community review period
- External security audit (for major versions)
- Bug bounty program (planned)
We thank the following security researchers for responsibly disclosing vulnerabilities:
- None yet - be the first to help us out!
For security concerns: *navinxmr@gmail.com
For general questions: Open a GitHub Discussion
Thank you for helping keep Navin secure!