| Version | Supported | Security Updates |
|---|---|---|
| 1.x.x | ✅ | ✅ |
| < 1.0 | ❌ | ❌ |
We take the security of Stellar seriously. If you discover a vulnerability, please report it responsibly.
Please do NOT open a public issue for security vulnerabilities.
Instead, please send an email to: security@stellar-ecosystem.com
Include the following information in your report:
- Type of vulnerability (e.g., XSS, SQL injection, access control, etc.)
- Affected versions of Stellar
- Detailed description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Any proof-of-concept code or screenshots (if available)
- Initial response: Within 48 hours
- Detailed assessment: Within 7 days
- Resolution timeline: Depends on severity, typically within 30 days
Our security team includes:
- Core maintainers
- Security advisors
- External security auditors
Stellar includes several built-in security features:
- End-to-end encryption using AES-256-GCM
- Differential privacy with configurable epsilon values
- Zero-knowledge architecture preventing data exposure
- Secure key management with hardware security module (HSM) support
- Role-based access control (RBAC)
- Multi-factor authentication (MFA)
- JWT-based authentication with short expiration
- API rate limiting and DDoS protection
- Privacy budget management preventing data leakage
- Consent management with audit trails
- Data retention policies with automatic deletion
- Anonymization techniques for sensitive data
- Container security with minimal attack surface
- Network isolation using micro-segmentation
- Regular security scanning and vulnerability assessment
- Compliance monitoring for GDPR, CCPA, and other regulations
-
Follow secure coding practices
- Input validation and sanitization
- Output encoding to prevent XSS
- Parameterized queries to prevent SQL injection
- Proper error handling without information disclosure
-
Use the security utilities provided
- Encryption services from
@stellar/shared - Privacy middleware for API endpoints
- Validation schemas using Zod
- Audit logging for sensitive operations
- Encryption services from
-
Test security features
- Write security-focused tests
- Test privacy controls thoroughly
- Verify encryption/decryption workflows
- Test access control mechanisms
-
Environment security
- Use strong, unique passwords
- Enable MFA for all accounts
- Regular security updates and patches
- Network monitoring and intrusion detection
-
Data protection
- Encrypt all sensitive data at rest
- Use TLS for all network communications
- Implement proper backup and recovery procedures
- Regular security audits and penetration testing
-
Access management
- Principle of least privilege
- Regular access reviews
- Audit trail monitoring
- Incident response procedures
- Report received - Security team acknowledges receipt
- Assessment - Team evaluates the vulnerability
- Coordination - Team works with reporter to understand the issue
- Remediation - Team develops and tests a fix
- Deployment - Fix is deployed to production
- Disclosure - Public disclosure after fix is deployed
We recognize and reward security researchers who help us improve Stellar:
- Hall of Fame - Recognition on our website
- Swag - Stellar merchandise
- Bounty - Monetary compensation for critical vulnerabilities
- Speaking opportunities - At our conferences and events
| Severity | Bounty Range |
|---|---|
| Critical | $5,000 - $10,000 |
| High | $2,000 - $5,000 |
| Medium | $500 - $2,000 |
| Low | $100 - $500 |
Severity Classification:
- Critical: Can compromise system integrity or cause data loss
- High: Can bypass security controls or access sensitive data
- Medium: Limited impact on security or privacy
- Low: Minor security issues with minimal impact
We conduct regular security audits:
- Code reviews by security experts
- Penetration testing by third-party firms
- Smart contract audits by specialized auditors
- Compliance audits for privacy regulations
Recent audit reports are available upon request for:
- Enterprise customers
- Security researchers
- Regulatory authorities
Contact: audits@stellar-ecosystem.com
- Level 1: Minor security issue with limited impact
- Level 2: Moderate security issue with potential data exposure
- Level 3: Critical security issue with system compromise
- Level 4: Catastrophic security issue with widespread impact
- Detection - Automated monitoring and manual review
- Assessment - Determine severity and impact
- Containment - Isolate affected systems
- Remediation - Apply fixes and patches
- Recovery - Restore normal operations
- Post-mortem - Analyze and improve processes
- Internal notification within 1 hour
- Customer notification within 24 hours (if applicable)
- Public disclosure as required by law and best practices
- Regular updates during incident resolution
Stellar is designed to comply with:
- GDPR (General Data Protection Regulation)
- CCPA (California Consumer Privacy Act)
- HIPAA (Health Insurance Portability and Accountability Act)
- SOC 2 (Service Organization Control 2)
- ISO 27001 (Information Security Management)
We are pursuing the following certifications:
- ISO 27001 - Information Security Management
- SOC 2 Type II - Security and Availability
- GDPR Compliance - Data Protection
- Privacy Seal - Privacy by Design
- Encryption utilities -
@stellar/shared/encryption - Privacy middleware -
@stellar/backend/middleware/privacy - Validation schemas -
@stellar/shared/validation - Audit logging -
@stellar/backend/utils/logger
- Email: security@stellar-ecosystem.com
- PGP Key: Available on request
- Response Time: Within 48 hours
- Email: info@stellar-ecosystem.com
- Discord: https://discord.gg/stellar
- Twitter: @stellar_security
- Platform: HackerOne
- Program: https://hackerone.com/stellar
- Policy: See bounty program details above
We thank the security community for their continued support in making Stellar more secure:
- Security researchers who report vulnerabilities
- Open source security tools and libraries
- Security auditors and penetration testers
- The broader security community
Remember: Security is everyone's responsibility. If you see something, say something!