We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 3.6.x | ✅ |
| 3.5.x | ✅ |
| 3.4.x | ✅ |
| < 3.4 | ❌ |
The Akash JSDK team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings, and will make every effort to acknowledge your contributions.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via:
- GitHub Security Advisories: Create a security advisory
- Email: If you prefer email, send details to the repository maintainers via GitHub
Include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
After you submit a report, we will:
- Acknowledge your report within 48 hours
- Investigate the issue and determine its impact
- Develop a fix for the vulnerability
- Release a patched version following our security release process
- Credit you in the security advisory (if desired)
- The security report is received and assigned to a primary handler
- The problem is confirmed and a list of affected versions is determined
- Code is audited to find any similar problems
- Fixes are prepared for all supported versions
- A security advisory is published
- Patched versions are released to npm
When using the Akash JSDK:
- Keep Updated: Always use the latest stable version
- Validate Input: Sanitize all user inputs before passing to SDK methods
- Secure Keys: Never commit private keys or mnemonics to version control
- Use Environment Variables: Store sensitive configuration in environment variables
- Review Dependencies: Regularly audit your dependencies with
pnpm audit
When contributing code:
- Input Validation: Always validate user inputs
- Error Handling: Never expose sensitive information in error messages
- Dependencies: Keep dependencies up-to-date and audit for vulnerabilities
- Code Review: All changes must pass security review
- Testing: Include security-focused tests for new features
The SDK handles sensitive cryptographic material. Users must:
- Never hardcode private keys in source code
- Use secure key management systems in production
- Implement proper access controls for wallet functionality
- Rotate keys regularly
When using JWT authentication (AEP-63):
- Tokens should have appropriate expiration times
- Use secure token storage mechanisms
- Implement token rotation for long-running applications
- Validate token signatures on the server side
All blockchain interactions should:
- Use HTTPS endpoints in production
- Verify TLS certificates
- Implement request signing where required
- Handle rate limiting gracefully
We use automated tools to monitor dependencies:
- Renovate Bot: Automated dependency updates
- GitHub Dependabot: Security vulnerability alerts
- npm audit: Manual security audits
We aim to handle security reports on the following timeline:
- Day 0: Report received
- Day 1-2: Initial acknowledgment and triage
- Day 3-7: Investigation and fix development
- Day 7-14: Testing and verification
- Day 14-21: Coordinated disclosure and release
- Day 21+: Public disclosure (if applicable)
Actual timelines may vary based on severity and complexity.
We currently do not have a bug bounty program. However, we deeply appreciate responsible disclosure and will acknowledge contributors in our security advisories.
For questions about this security policy, please open an issue or discussion on GitHub.
We thank the following security researchers for responsibly disclosing vulnerabilities:
(List will be updated as reports are received and addressed)
Last Updated: 2025-11-14