We take the security of WinScan seriously. If you discover a security vulnerability, please report it responsibly.
Please DO NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
- π§ Email: [email protected]
- π¬ Telegram: @winsnip (for urgent issues)
Please include the following information in your report:
- Type of vulnerability
- Full paths of affected source file(s)
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
After submitting a vulnerability report, you can expect:
- Acknowledgment: We'll acknowledge receipt of your report within 48 hours
- Assessment: We'll assess the vulnerability and determine its severity
- Updates: We'll keep you informed about our progress
- Fix & Disclosure: Once fixed, we'll publicly disclose the vulnerability (with credit to you, if desired)
- Critical vulnerabilities: Patched within 7 days
- High severity: Patched within 14 days
- Medium severity: Patched within 30 days
- Low severity: Patched in next regular release
We release security updates for the following versions:
| Version | Supported |
|---|---|
| main | β |
| dev | β |
| < 1.0 | β |
When using WinScan:
- Always verify you're on the official domain
- Never share your private keys or seed phrases
- Use hardware wallets for large amounts
- Keep your browser and extensions updated
- Be cautious of phishing attempts
- Keep dependencies up to date
- Follow secure coding practices
- Never commit sensitive data (API keys, passwords)
- Use environment variables for secrets
- Enable 2FA on your GitHub account
- Review code changes carefully before merging
- Use secure RPC/API endpoints (HTTPS only)
- Implement rate limiting
- Monitor for unusual activity
- Keep node software updated
- Use firewall rules to restrict access
- Public API endpoints may be rate-limited
- Consider running your own backend for production use
- This is a frontend application
- Never enter private keys in the browser
- Use official wallet extensions (Keplr, Leap, etc.)
- Always verify transaction data on multiple sources
- Don't rely solely on explorer data for critical decisions
We announce security updates through:
We follow responsible disclosure practices:
- We'll work with you to understand and fix the issue
- We'll credit you in the security advisory (if you wish)
- We won't take legal action against security researchers who:
- Make a good faith effort to avoid privacy violations
- Don't exploit vulnerabilities beyond necessary verification
- Report vulnerabilities promptly
- Keep vulnerabilities confidential until fixed
Currently, we don't have a formal bug bounty program. However:
- We deeply appreciate security research
- We'll publicly acknowledge contributors
- Exceptional findings may receive recognition
For security-related inquiries:
- π§ Email: [email protected]
- π¬ Telegram: @winsnip
For general questions, use:
- π GitHub Issues
- π¬ Telegram Community
Thank you for helping keep WinScan and our users safe! π