Currently, we only release security updates for the latest major version of SecureCrypto.
Version | Supported |
---|---|
0.1.x | ✅ |
< 0.1.0 | ❌ |
- Security patches are released as soon as possible after a vulnerability is confirmed
- Minor version updates include security patches without breaking changes
- All security updates are documented in our release notes
- Critical vulnerabilities trigger an immediate patch release
- Users are notified of security updates through our GitHub Security Advisories
I take security vulnerabilities seriously. You can report security vulnerabilities through public GitHub issues, but it would be better to
Instead:
-
Email me at mavbozo@pm.me with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any supporting materials (PoC code, logs)
-
I will follow up with:
- Confirmation of the vulnerability
- Our plans for a fix
- Any questions I have about your report
-
Once a fix is ready, I will:
- Notify you for review
- Release the fix
- Credit you in our security advisory (unless you prefer to remain anonymous)
SecureCrypto attempts to use hardware security features when available:
- StrongBox Keymaster
- Trusted Execution Environment (TEE)
- Hardware-backed Android Keystore
When hardware security is unavailable, the library falls back to software implementations with clear security level indicators.
The library implements strict memory handling practices:
- All sensitive data is zeroed after use
- Secure memory wrappers ensure cleanup
- No sensitive data in logs or exceptions
- Protection against memory dumps
We implement protections against:
- Timing attacks
- Power analysis
- Cache attacks
- Memory access patterns
- Random Number Generation
- Hardware entropy quality varies by device
- Software fallback has lower security guarantees
- Entropy assessment is best-effort
We provide SHA-256 checksums for all releases. Verify downloaded artifacts with:
sha256sum securecrypto-0.1.0.aar
Compare with the checksums in our release notes.
The library undergoes:
- Regular security audits
- Static analysis
- Dynamic analysis
- Fuzzing tests
- Memory leak detection
- Side-channel analysis
When integrating SecureCrypto:
-
Version Requirements
- Target API level 23 or higher
- Keep library updated to latest version
- Monitor security advisories
-
Runtime Environment
- Verify hardware security feature availability
- Handle security level downgrades gracefully
- Implement proper error handling
-
Memory Management
- Use
SecureBytes
for sensitive data - Implement proper cleanup in
finally
blocks - Avoid logging sensitive information
- Use
All releases are signed with our release key. The public key fingerprint is:
[To be added after key generation]
SecureCrypto is designed to protect against:
-
Local Threats
- Memory dumps
- Process inspection
- Debugger attachment
- Side-channel attacks
-
Implementation Threats
- Timing attacks
- Memory leaks
- Improper cleanup
- Error information leaks
-
Known Limitations
- Cannot protect against compromised OS
- Limited protection against physical attacks
- Dependent on platform security features
We encourage users to:
- Review our source code
- Run our test suite
- Conduct security assessments
- Report any findings
In case of a security incident:
-
We will:
- Investigate promptly
- Issue fixes quickly
- Notify affected users
- Publish post-mortem analysis
-
Users should:
- Update immediately
- Monitor our security advisories
- Follow mitigation instructions
- Report any issues encountered
- Security issues: mavbozo@pm.me
- PGP Key: [To be added]
For non-security issues, use GitHub issues.