We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
We take security seriously. If you discover a security vulnerability, please follow these steps:
- DO NOT create a public GitHub issue for security vulnerabilities
- Email security reports directly to: dev@0xwulf.dev
- Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Suggested fix (if available)
- Initial Response: Within 48 hours
- Assessment: Within 7 days
- Fix Development: Based on severity (1-30 days)
- Public Disclosure: After fix is deployed
KeyJolt implements multiple security layers:
- Input Validation: Server-side validation for all user inputs
- Rate Limiting: Token bucket algorithm with configurable limits
- Security Headers: HSTS, CSP, X-Frame-Options, X-Content-Type-Options
- Stateless Design: No server-side session storage
- Key Generation: Uses cryptographically secure random number generators
- RSA Implementation: Bouncy Castle library with industry-standard algorithms
- Key Strength: Supports 2048, 3072, and 4096-bit RSA keys
- Secure Deletion: Files overwritten with random data before deletion
- Automatic Cleanup: Generated keys deleted after 5 minutes
- No Persistence: Keys never stored permanently
- Memory Management: Secure handling of sensitive data in memory
- File System: Restricted access to temporary file directories
- Private keys are generated server-side (necessary for web interface)
- Keys exist temporarily in server memory during generation
- Network transmission of generated keys (use HTTPS in production)
- Immediate secure deletion after download
- Rate limiting prevents automated abuse
- No logging of key material
- Secure random number generation
- Always use HTTPS in production deployments
- Download keys immediately after generation
- Verify key integrity using fingerprints
- Store private keys securely offline
- Never share private keys via insecure channels
- HTTPS with valid TLS certificates
- Proper firewall configuration
- Regular security updates
- Monitoring and alerting
- Web Application Firewall (WAF)
- DDoS protection
- Regular security audits
- Backup and recovery procedures
We particularly welcome reports for:
- Authentication/Authorization bypass
- Input validation vulnerabilities
- Cryptographic implementation issues
- Information disclosure vulnerabilities
- Denial of Service attack vectors
- File handling security issues
We appreciate responsible disclosure and will acknowledge security researchers who help improve KeyJolt's security:
- Public acknowledgment in release notes (if desired)
- Recognition in security hall of fame
- Direct communication with development team
For security-related questions or concerns:
- Email: dev@0xwulf.dev
- GitHub: @hexawulf
Thank you for helping keep KeyJolt secure!