| Version | Supported |
|---|---|
| 1.2.x | ✅ |
| 1.1.x | ✅ |
| 1.0.x | ❌ |
We take the security of our application seriously. If you discover a security vulnerability, please report it to us privately before disclosing it publicly.
- Email: security@batch-airdrop.com
- Include detailed information about the vulnerability
- Provide steps to reproduce the issue if possible
- Allow us reasonable time to address the vulnerability before public disclosure
- Type of vulnerability (e.g., XSS, authentication bypass, data exposure)
- Affected versions of the application
- Detailed description of the vulnerability
- Proof of concept or steps to reproduce
- Potential impact of the vulnerability
- Suggested mitigation if applicable
- Critical: 48 hours
- High: 72 hours
- Medium: 1 week
- Low: 2 weeks
Our application implements the following security measures:
- AES-256-GCM encryption for all private keys
- Master key protection with user-defined passwords
- PBKDF2 key derivation with 100,000 iterations
- Secure memory handling for sensitive data
- Local database encryption for sensitive campaign data
- No plaintext storage of private keys or passwords
- Secure random number generation using crypto module
- HTTPS/TLS for all external API communications
- RPC endpoint validation to prevent MITM attacks
- Input validation for all user-provided data
- Code signing for executable verification
- Auto-update verification with cryptographic signatures
- Process isolation between main and renderer processes
- Use strong passwords for wallet encryption
- Keep software updated to the latest version
- Verify downloads from official sources only
- Backup wallets securely offline
- Use hardware wallets for large amounts
- Validate all inputs and sanitize user data
- Use parameterized queries to prevent SQL injection
- Implement proper error handling without exposing sensitive information
- Follow principle of least privilege for all operations
- Regular security audits of the codebase
- Malware infection of user's system
- Phishing attacks targeting user credentials
- Network interception of sensitive communications
- Database compromise through direct access
- Supply chain attacks through dependency compromise
- Code signing and verification
- User education and security warnings
- End-to-end encryption for sensitive data
- Database encryption and access controls
- Dependency scanning and regular updates
We appreciate your help in making our application more secure. When reporting vulnerabilities:
- Do not exploit the vulnerability beyond what's necessary for demonstration
- Do not disclose the vulnerability publicly until we've addressed it
- Do provide sufficient information for us to reproduce and fix the issue
- Do allow us reasonable time to respond and release a fix
Security updates will be released as:
- Critical patches: Immediately after vulnerability is fixed
- Security releases: Scheduled for the first Tuesday of each month
- Feature updates: Include security improvements as part of regular releases
Users will be automatically notified of available updates through the application's auto-update mechanism.
For security-related inquiries:
- Security Team: security@batch-airdrop.com
- General Support: support@batch-airdrop.com
- Security Research: research@batch-airdrop.com
Thank you for helping keep our application and users secure!