We release security updates for the following versions of Solvanity:
| Version | Supported |
|---|---|
| 1.6.x | ✅ |
| 1.5.x | ✅ |
| < 1.5.0 | ❌ |
Solvanity is designed with security as a top priority. The application provides the following guarantees:
-
No Network Activity: Solvanity does NOT make any network requests
- No HTTP/HTTPS connections
- No WebSocket connections
- No external API calls
- No DNS lookups
- All operations are 100% local
-
No Data Exfiltration: Your sensitive data never leaves your machine
- File operations limited to
address/directory only - No access to system directories
- No reading of sensitive files (SSH keys, browser data, environment variables)
- No clipboard access
- No system notifications used for data leakage
- File operations limited to
-
Cryptographically Secure: All cryptographic operations use industry standards
crypto.getRandomValues()for secure random number generation- BIP39 standard for mnemonic generation
- Solana standard HD derivation path:
m/44'/501'/0'/0' - Ed25519 keypair generation
- No backdoors or weakened random number generators
-
No Code Injection: Safe from common injection attacks
- No use of
eval(),Function(), orvmmodule - No dynamic code execution
- No shell command execution
- All user input is properly validated
- No use of
You can verify Solvanity's security independently using AI-powered code analysis. See SECURITY_AUDIT.md for detailed instructions on how to:
- Use Claude, ChatGPT, Gemini, or DeepSeek to analyze the code
- Verify no malicious code exists
- Confirm no network activity occurs
- Check cryptographic security
- Validate input handling
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
DO NOT open a public GitHub issue for security vulnerabilities.
Instead, please report security issues via one of these methods:
- Email: Send details to security@define.systems
- GitHub Security Advisory: Use GitHub's private vulnerability reporting feature
- Go to the Security tab
- Click "Report a vulnerability"
- Fill out the form with details
When reporting a vulnerability, please include:
- Description: Clear description of the vulnerability
- Impact: What could an attacker do with this vulnerability?
- Steps to Reproduce: Detailed steps to reproduce the issue
- Affected Versions: Which versions are affected?
- Suggested Fix: If you have a suggestion for how to fix it (optional)
- Your Contact Info: How we can reach you for follow-up questions
After you submit a vulnerability report:
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Assessment: We'll assess the vulnerability within 7 days
- Updates: We'll keep you informed of our progress
- Fix Timeline: Critical issues will be fixed within 30 days
- Disclosure: We'll coordinate public disclosure with you
- Credit: You'll be credited in the security advisory (unless you prefer to remain anonymous)
We classify vulnerabilities as follows:
Critical (Fix within 7 days)
- Remote code execution
- Private key exposure
- Mnemonic phrase leakage
- Network-based data exfiltration
High (Fix within 14 days)
- Local privilege escalation
- File system access outside
address/directory - Cryptographic weaknesses
- Input validation bypass leading to code execution
Medium (Fix within 30 days)
- Denial of service
- Information disclosure (non-sensitive)
- Input validation issues (low impact)
Low (Fix within 60 days)
- Minor information leaks
- UI/UX issues with security implications
- Best practice violations
To maximize security when using Solvanity:
-
Offline Generation: Generate addresses on an air-gapped computer
- Disconnect from the internet before generating
- Never connect the computer to the internet after generating
- Transfer files using USB drives (scan for malware first)
-
Secure Storage: Protect your generated files
- Store mnemonic phrases in encrypted containers
- Use hardware-encrypted USB drives
- Never email or message mnemonic phrases
- Consider physical storage (paper wallets) stored in secure locations
-
File Management: Handle output files carefully
- Delete temporary files securely (use
shredor similar tools) - Never commit address files to version control
- Verify
.gitignoreincludesaddress/directory - Encrypt files before cloud storage
- Delete temporary files securely (use
-
Verification: Always verify the software
- Clone from official GitHub repository only
- Check commit signatures when available
- Review code changes before updating
- Use AI-powered security analysis (see SECURITY_AUDIT.md)
Never do these things:
- ❌ Share mnemonic phrases with anyone
- ❌ Store mnemonics in plain text files on networked computers
- ❌ Enter mnemonics into websites or online forms
- ❌ Take screenshots of mnemonic phrases (they can be recovered)
- ❌ Store mnemonics in email, messaging apps, or cloud notes
- ❌ Generate addresses on shared or public computers
- ❌ Run Solvanity on a computer with untrusted software
- ❌ Use addresses for high-value transactions without offline generation
Solvanity uses the following trusted dependencies:
@solana/kit(v5.0.0+) - Modern Solana SDK (includes@solana/keys,@solana/addresses, and 40+ modular packages)bip39-light- BIP39 mnemonic generationed25519-hd-key- HD key derivationbs58- Base58 encodingchalk,ora,commander,qrcode-terminal- CLI utilities
All dependencies are from well-known, actively maintained packages. We regularly review and update dependencies to patch security vulnerabilities.
Note: As of v1.6.0, Solvanity uses @solana/kit (the modern, modular evolution of @solana/web3.js) which provides enhanced security through tree-shakable packages and native Web Crypto API support.
You can check for known vulnerabilities in dependencies:
bun auditSecurity updates will be:
- Released as soon as possible after verification
- Announced on GitHub releases page
- Tagged with
[SECURITY]in the release notes - Include CVE numbers when applicable
- Provide clear upgrade instructions
Subscribe to the GitHub repository to receive notifications of security updates.
If you report a vulnerability responsibly, we commit to:
- Work with you to understand and resolve the issue quickly
- Keep you informed throughout the process
- Publicly acknowledge your contribution (if you wish)
- Not take legal action against security researchers who follow this policy
We're grateful to the following security researchers who have helped make Solvanity more secure:
No vulnerabilities have been reported yet.
Last Updated: 2025-11-23 Version: 1.6.1
For general questions, see our README or open a GitHub issue.