If you discover a security issue affecting HeliumDesktop, please report it privately so it can be reviewed and addressed responsibly.
Please report issues privately to allow us time to assess and fix them.
Do not publish or share exploits publicly before a fix is widely available.
Focus on vulnerabilities impacting wallet security, key handling, and distribution.
We are committed to working with researchers on coordinated disclosure timelines.
HeliumDesktop welcomes responsible security reports from independent researchers, users, and ecosystem contributors. This policy applies to vulnerabilities relating to the website, downloads, release verification mechanisms, documentation, and the desktop wallet software itself.
We believe that private disclosure is the safest path forward. It ensures issues can be thoroughly assessed, patched, and distributed to the community before broad publication.
All security reports should be submitted privately through our designated security contact channel. Please do not open public GitHub issues, post on Discord, or tweet about the vulnerability before it has been acknowledged and resolved.
Encouraging private reports helps us protect end-users from opportunistic exploitation while we work diligently to resolve the underlying concern.
Please send all security-related communications directly to our security team. For sensitive vulnerabilities, we highly recommend encrypting your communication using our PGP key.
security@helium.org
A1B2 C3D4 E5F6 7890 1234 5678 90AB CDEF 1234 5678
To help us triage and verify your report efficiently, please include the following information in your initial communication:
We are primarily interested in practical vulnerabilities that represent a tangible risk to our users. Examples of in-scope issues include:
To ensure our team can focus on critical security threats, the following categories are generally considered out of scope for this disclosure process:
When conducting vulnerability research, we ask that you adhere strictly to the following principles:
In response to a good-faith report submitted in accordance with this policy, the project team aims to:
If a report is validated and requires a fix, the project will work with the reporter to establish a coordinated disclosure timeline. The exact timing of disclosure will depend on the severity of the vulnerability, the potential risk to users, and the required progress for implementing and distributing a patch.
We ask that researchers refrain from discussing or publishing details about the vulnerability until the coordinated embargo period has concluded and an official advisory has been published or authorized.
The project will not pursue action against good-faith security research conducted strictly in line with this policy. Provided that your research avoids harm, privacy intrusion, data theft, service abuse, and strictly adheres to the rule against public disclosure before review, we will consider your activities authorized.
Please note that this safe harbor applies only to legal claims under the project's direct control. We cannot authorize research on third-party infrastructure or exempt researchers from independent third-party claims.
At this time, HeliumDesktop does not operate a formal, public bug bounty program with guaranteed financial payouts. All security reports are treated as voluntary contributions to open-source and community security.
Recognition, formal public credit in release notes, or other follow-up measures may be provided entirely at the project’s discretion for exceptionally high-impact, coordinated disclosures.
To submit a report, or if you have questions regarding the scope of this policy, please reach out via our primary security channel:
Ensure user safety by notifying us privately before initiating any public discussion.
Detailed steps, PoCs, and environment details significantly speed up our ability to verify issues.
Respect the coordinated disclosure process by withholding exploit details until a fix is live.
Quick clarification regarding our disclosure process.
Private, coordinated disclosure is preferred.