Please report security vulnerabilities by opening a private security advisory on GitHub or by emailing [email protected].
We will respond within 48 hours and work with you to understand and address the issue.
| Version | Supported |
|---|---|
| 1.0.x | Yes |
- Private keys are stored using Electron's
safeStorageAPI, which leverages OS-level secure storage (Keychain on macOS, Credential Manager on Windows, Secret Service on Linux) - Keys are encrypted at rest and only accessible by the application
- Per-DID key isolation prevents cross-account access
- End-to-end encryption via XMTP protocol
- Messages are encrypted using MLS (Messaging Layer Security)
- Local database encryption with AES-GCM
- OAuth 2.0 with PKCE for Bluesky authentication
- OAuth URLs validated against allowlist (bsky.social, bsky.app domains only)
- No credentials stored in plaintext
- Context isolation enabled
- Node integration disabled in renderer process
- IPC handlers validate input (key prefix restrictions, length limits)
- No remote code execution
- Keep your operating system and this application up to date
- Use a strong password or biometric authentication for your device
- Do not share your recovery phrases or private keys
- Be cautious of phishing attempts