Skip to content

Security Policy

Supported Versions

We provide security updates for the following versions:

Version Supported
1.x.x :white_check_mark:
< 1.0 :x:

Reporting a Vulnerability

IMPORTANT: Please do NOT report security vulnerabilities publicly via GitHub Issues.

How to Report

If you discover a security vulnerability, please report it privately:

  1. Email: support@airfeedkh.com
  2. Subject: [SECURITY] Brief description of vulnerability
  3. Include:
  4. Description of the vulnerability
  5. Steps to reproduce
  6. Potential impact
  7. Suggested fix (if any)
  8. Your contact information

What to Report

Please report: - E2EE implementation flaws - Key management vulnerabilities - Authentication bypasses - Data leakage - Injection vulnerabilities - Cryptographic weaknesses - Any issue that could compromise user privacy or security

Response Timeline

  • Initial Response: Within 48 hours
  • Status Update: Within 7 days
  • Resolution: Depends on severity, typically 30-90 days

We will: 1. Acknowledge receipt of your report. All complaints will be reviewed. 2. Investigate the vulnerability 3. Work with you to address the issue 4. Release a fix and security advisory 5. Credit you (if desired) in the advisory

Disclosure Policy

  • We follow responsible disclosure practices
  • Vulnerabilities will be disclosed after a fix is available
  • We will coordinate with you on disclosure timing
  • Public disclosure should wait until after the fix is released

Security Best Practices

For Contributors

When contributing code:

  1. Never commit secrets or credentials
    • Use Config.local.xcconfig (gitignored)
  2. Add secrets to .gitignore
  3. Use secure storage (Keychain) for sensitive data

  4. Follow E2EE guidelines

  5. Use approved cryptographic algorithms
  6. Store keys securely in Keychain
  7. Never log sensitive data
  8. Validate all cryptographic operations

  9. Secure coding practices

  10. Validate all inputs
  11. Handle errors securely
  12. Use parameterized queries (if applicable)
  13. Follow principle of least privilege

  14. Review security implications

  15. Consider impact on E2EE
  16. Review key management changes
  17. Test security-critical code thoroughly

For Partners

When building custom applications:

  1. Protect API credentials
  2. Store in Config.local.xcconfig (gitignored)
  3. Never commit credentials to public repos
  4. Rotate credentials if compromised

  5. Secure distribution

  6. Use proper code signing
  7. Enable certificate pinning in production
  8. Follow App Store security guidelines

  9. Key management

  10. Never share private keys
  11. Use secure key storage
  12. Implement proper key rotation

Security Features

End-to-End Encryption

  • Key Exchange: P-256 (secp256r1) ECDH via Secure Enclave (preferred), with RSA-2048 (RSA-OAEP-SHA256) supported as fallback/legacy
  • Media Encryption: AES-256-GCM
  • Key Storage: iOS Keychain with kSecAttrAccessibleAfterFirstUnlockThisDeviceOnly (Secure Enclave-backed private key for P-256)
  • No Server Access: Server cannot decrypt media data

Secure Storage

  • Private keys stored in Keychain
  • Access tokens stored securely
  • No sensitive data in UserDefaults
  • Proper key cleanup on logout

Network Security

  • HTTPS for all API calls
  • Certificate pinning (recommended for production)
  • Secure WebSocket connections (WSS)
  • TURN/STUN server security

Known Security Considerations

Multi-Device Support

  • Each device registers a public key for E2EE (P-256 preferred; RSA-2048 supported as fallback/legacy)
  • AES keys encrypted per device
  • Current limitation: Keys cannot be shared between devices

Key Recovery

  • Recovery keys encrypted with user password
  • Keys stored locally, not on server
  • No key escrow or backdoor access

Call Rejoin

  • AES keys shared securely via STOMP
  • Encrypted with requester's RSA public key
  • Only active participants can share keys

Security Updates

We regularly: - Update dependencies for security patches - Review and audit code - Monitor for security advisories - Test for vulnerabilities - Update security documentation

Security Resources

Contact

For security-related questions (non-vulnerabilities): - Email: support@airfeedkh.com - Response Time: Within 5 business days

Thank you for helping keep ECall iOS secure! 🔒