The following versions of Axionvera Network are currently being supported with security updates:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
Security Patch Policy:
- Only the latest minor version (0.1.x) receives security patches
- Security updates are released as patch versions (e.g., 0.1.1 → 0.1.2)
- Major vulnerabilities may result in immediate hotfix releases
- All users are strongly encouraged to upgrade to the latest version promptly
We take the security of Axionvera Network seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not open public GitHub issues for security vulnerabilities. This prevents potential exploitation before a fix is available.
Email: security@axionvera.network (preferred)
PGP Key: Available at keybase.io/axionvera or upon request
Response Timeline:
- We will acknowledge receipt of your report within 48 hours
- We will send a more detailed response within 7 days indicating the next steps
- We will keep you informed of our progress throughout the process
To help us triage and respond quickly, please include:
- Description: Clear description of the vulnerability
- Impact: Potential impact if exploited
- Reproduction: Step-by-step instructions to reproduce the issue
- Affected Components: Which parts of the system are affected
- Suggested Fix: If you have suggestions for addressing the issue
We follow a responsible disclosure process:
- Initial Report: You submit a detailed report via secure email
- Acknowledgment: We confirm receipt within 48 hours
- Assessment: Our security team evaluates the report (5-10 days)
- Fix Development: We develop and test a patch
- Release: Security fix is deployed and announced
- Disclosure: After 30 days from release, we encourage public disclosure
We kindly ask that you:
- Allow us a reasonable time to fix the issue before public disclosure
- Make an effort to work with us to understand and resolve the issue
- Provide us with sufficient time to prepare a patch before disclosure
When deploying Axionvera Network, please follow these security best practices:
- Use TLS/SSL for all network communications
- Deploy behind a firewall with restricted access
- Use VPN or SSH tunnels for administrative access
- Regularly update underlying OS and dependencies
- Monitor logs for suspicious activity
- Never share private keys or credentials
- Use environment variables for sensitive configuration
- Enable audit logging in production
- Regularly rotate credentials and API keys
- Implement rate limiting and DDoS protection
- Review contract code before deployment
- Test thoroughly on testnet before mainnet
- Consider third-party security audits
- Monitor contract events and transactions
- Have incident response procedures in place
This section outlines what is and isn't considered a security vulnerability in the context of Axionvera Network.
The following are considered security vulnerabilities and should be reported:
- Arbitrary code execution on network nodes
- Unauthorized command execution through API endpoints
- Code injection vulnerabilities
- Bypassing authentication mechanisms
- Privilege escalation attacks
- Unauthorized access to admin endpoints
- Unauthorized modification of vault balances
- Manipulation of reward calculations
- Tampering with transaction history
- Resource exhaustion attacks (memory, CPU, disk)
- Amplification attacks
- Attacks that crash network nodes
- Exposure of private keys or secrets
- Leakage of user data
- Unauthorized access to sensitive configuration
- Reentrancy attacks
- Integer overflow/underflow
- Logic errors allowing fund theft
- Flash loan attack vectors
The following are generally not considered security vulnerabilities:
- Economic exploits that work as designed (e.g., MEV, arbitrage)
- Game theory exploits within protocol rules
- Front-running on public mempools
- Missing best practices without direct exploit path
- Theoretical attacks with no practical demonstration
- Issues requiring unrealistic assumptions (e.g., private key compromise)
- Vulnerabilities in underlying blockchain (Stellar/Soroban)
- Issues in third-party libraries (report upstream)
- Browser-specific security warnings
- Phishing attacks (report to appropriate platforms)
- Impersonation attacks
- Community management issues
- Insecure default configurations (unless exploitable remotely)
- User misconfiguration of their own deployments
- Lack of security features (vs. broken security features)
Some issues require careful consideration:
- Missing rate limits: Generally not a vulnerability unless combined with other issues
- Rate limit bypass: May be a vulnerability if it enables DoS or brute force
- Metadata leakage: Depends on sensitivity and exploitability
- Timing attacks: Considered vulnerabilities if practically exploitable
- Network partitioning: Considered vulnerabilities
- Transaction ordering: Generally not vulnerabilities unless manipulated
Security updates will be communicated through:
- GitHub Security Advisories: For critical vulnerabilities
- Release Notes: General security fixes in new versions
- Direct Communication: For severe issues affecting specific deployments
- Blog Posts: Educational content about security improvements
We would like to thank the following for their contributions to our security:
- Security researchers who responsibly disclose vulnerabilities
- The Stellar Security Team for collaboration on Soroban-related issues
- The open-source community for ongoing security reviews
For any questions about this security policy, please contact:
- Email: security@axionvera.network
- Twitter: @AxionveraNet (for general inquiries only, NOT for reporting vulnerabilities)
This security policy is subject to change without notice. Last updated: March 26, 2026.