The TTL-Legacy smart contract handles real XLM (Stellar Lumens) and implements time-locked vaults with beneficiary distributions. Security is critical to protect user funds and ensure the integrity of the contract.
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
Only the latest version of the contract is supported. Users should always deploy the most recent audited version.
We take security vulnerabilities seriously. If you discover a security vulnerability, please follow responsible disclosure practices.
DO NOT open a public GitHub issue for security vulnerabilities.
Instead, please report vulnerabilities via one of the following methods:
- Email: Send details to [email protected]
- Encrypted Communication: Use our PGP key available at https://ttl-legacy.example.com/security-key.asc
When reporting a vulnerability, please include:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact on user funds
- Suggested fix (if available)
- Your contact information for follow-up
- Initial Response: Within 48 hours of receipt
- Status Update: Within 7 days
- Fix Timeline: Depends on severity, typically 14-30 days for critical issues
- Critical: Immediate fund loss or unauthorized access to user funds
- High: Potential fund loss or contract manipulation
- Medium: Contract functionality issues without direct fund risk
- Low: Minor issues or improvements
IMPORTANT: Before deploying to mainnet, the contract MUST undergo a comprehensive security audit by a reputable third-party auditor. No mainnet deployment should occur without:
- Complete code review
- Formal security audit report
- Resolution of all critical and high-severity findings
- Community review period
- Authorization Checks: All sensitive operations require proper authentication
- Error Handling: Structured error codes for reliable client-side error handling
- Time-Lock Mechanism: Funds are locked until specified conditions are met
- Beneficiary Protection: Multiple beneficiaries with BPS-based distribution
- Pause Functionality: Admin can pause contract in emergency situations
- Verify Contract Address: Always confirm you're interacting with the official contract
- Check Parameters: Double-check all transaction parameters before signing
- Monitor Expiry: Use
ping_expiryto monitor vault TTL status - Use View Functions: Check vault status before executing state-changing operations
We are considering implementing a bug bounty program for security researchers. Details will be announced once the program is established.
Security updates and announcements will be published through:
- GitHub Security Advisories
- Official project communication channels
- Contract upgrade notifications (when applicable)
For general security questions or concerns: [email protected]
We thank the security research community for their contributions to keeping this project secure.
Last Updated: 2026-03-27