| Version | Supported |
|---|---|
| 0.9.x | ✅ |
| < 0.9 | ❌ |
If you discover a security vulnerability in @fintoda/react-native-crypto-lib, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please use GitHub Security Advisories to report the vulnerability privately.
Alternatively, you can email support@fintoda.com with:
- A description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Acknowledgment within 48 hours
- Initial assessment within 5 business days
- Fix or mitigation plan communicated within 10 business days
The following are considered in scope for this cryptographic library:
- Memory leaks of secret key material (private keys, seeds, master secrets, ECDH shared secrets)
- Incorrect cryptographic output (wrong hash, invalid signature, broken derivation)
- Timing side-channels in security-sensitive operations
- Buffer overflows or out-of-bounds reads in C++ native code
- Weak or predictable random number generation
- Padding oracle or authentication bypass in AES operations
Constant-time properties for ECDSA/Schnorr/Ed25519/X25519 scalar operations, AES core rounds, and PKCS#7 padding validation are inherited from the vendored trezor-crypto implementation. This library adds a constant-time PKCS#7 check at the JSI boundary and memzero() scrubbing of secret-bearing buffers on every exit path. Timing guarantees on the underlying primitives are only as strong as the platform's memcmp, compiler, and CPU — assume a local attacker with cache-timing capabilities is out of scope.
The following are out of scope:
- Vulnerabilities in the upstream React Native framework
- Issues that require physical access to the device
- Denial of service through large input sizes (documented limits exist)