Security & Audits
Security is foundational to GhostSpeak. This page details our security practices, audit status, bug bounty program, and how to report vulnerabilities responsibly.Current Security Status
Development Stage
Devnet Testing (Current)Not production-ready. Do not use real funds.
Mainnet Launch
Q1 2026 (Planned)After security audit and penetration testing.
Security Roadmap
| Milestone | Status | Expected |
|---|---|---|
| Internal security review | ✅ Complete | Oct 2025 |
| Static analysis (automated) | ✅ Complete | Nov 2025 |
| External smart contract audit | ⏳ In Progress | Feb 2026 |
| Penetration testing | 📅 Scheduled | Mar 2026 |
| Economic security analysis | 📅 Scheduled | Mar 2026 |
| Bug bounty program launch | 📅 Planned | Apr 2026 (mainnet) |
Smart Contract Audits
Upcoming Audit (Q1 2026)
Auditor: [To be announced - top-tier Web3 security firm] Scope:- All Solana programs (Anchor)
- Ghost Score calculation logic
- Escrow and payment flows
- Governance mechanisms
- Credential issuance/verification
- Kickoff: January 2026
- Audit period: 4-6 weeks
- Report publication: February 2026
Internal Security Review
Completed: October 2025 Findings: 12 issues identified and resolved- 0 Critical
- 2 High (fixed)
- 5 Medium (fixed)
- 5 Low (fixed)
- Added reentrancy guards to escrow release
- Implemented overflow checks in Ghost Score calculation
- Added access control to admin functions
- Improved error handling in credential verification
Security Best Practices
We follow industry-standard security practices:Smart Contract Security
Development:- ✅ Written in Anchor (Rust) with type safety
- ✅ Extensive unit and integration tests (95%+ coverage)
- ✅ Automated static analysis (Clippy, Anchor linting)
- ✅ Formal verification for critical functions (in progress)
- ✅ Multi-signature program authority (3-of-5 multisig)
- ✅ Upgrade authority requires DAO vote
- ✅ Emergency pause mechanism for critical bugs
- ✅ Time-locked upgrades (7-day delay)
- ✅ Real-time transaction monitoring
- ✅ Anomaly detection for unusual activity
- ✅ Automated alerts for critical events
API & Backend Security
Authentication:- ✅ API keys with rate limiting
- ✅ JWT tokens for session management
- ✅ Wallet signature verification for sensitive operations
- ✅ TLS 1.3 for all connections
- ✅ Encrypted at rest (AES-256)
- ✅ Regular automated backups
- ✅ No storage of private keys
- ✅ DDoS protection (Cloudflare)
- ✅ Web Application Firewall (WAF)
- ✅ Isolated production environment
- ✅ SOC 2 Type II compliance (in progress)
Web Dashboard Security
Frontend:- ✅ Content Security Policy (CSP)
- ✅ Subresource Integrity (SRI)
- ✅ XSS protection headers
- ✅ Regular dependency updates
- ✅ Never requests private keys
- ✅ Transaction simulation before signing
- ✅ Clear transaction previews
- ✅ Phishing detection
Bug Bounty Program
Status: Launching with mainnet (Q2 2026) Platform: Self-hosted + Immunefi (pending)Reward Structure
| Severity | Description | Payout |
|---|---|---|
| Critical | Theft of funds, unauthorized minting, complete contract takeover | 100,000 |
| High | Unauthorized state changes, privilege escalation, ghost score manipulation | 10,000 |
| Medium | Denial of service, information disclosure, logic errors | 5,000 |
| Low | UI bugs, minor logic issues, gas optimizations | 1,000 |
- +50% for working exploit proof-of-concept
- +25% for suggested fix/patch
- +10% for high-quality report
In Scope
Smart Contracts:- Ghost Score reputation program
- Credential issuance/verification
- Escrow and payment contracts
- Governance and staking
- Token contracts (GHOST)
- API endpoints (https://api.ghostspeak.io)
- Webhook delivery system
- Crossmint integration
- Authentication system
- https://ghostspeak.io
- Wallet integration
- XSS, CSRF, injection vulnerabilities
- Critical logic errors
- Signature verification bypasses
- Transaction manipulation
Out of Scope
Not eligible for bounties:- Devnet/testnet exploits (report anyway, no reward)
- Previously reported issues
- Issues in third-party dependencies (report to maintainer)
- Social engineering or phishing
- Rate limiting or spam
- UI/UX issues without security impact
- Theoretical attacks without proof-of-concept
Rules
Eligibility:- ✅ First reporter of unique vulnerability
- ✅ Provide clear reproduction steps
- ✅ Follow responsible disclosure (90-day embargo)
- ❌ No exploit for profit
- ❌ No public disclosure before fix
- ❌ No mass automated scanning (causes DoS)
- Detailed description of vulnerability
- Impact assessment (who is affected, how much at risk)
- Proof-of-concept (code or detailed steps)
- Suggested remediation (optional but increases payout)
Responsible Disclosure
Found a security issue? Please follow these guidelines:1. Report Privately
DO NOT:- Post on GitHub issues (public)
- Tweet about it
- Disclose in Discord/Telegram
- Exploit for personal gain
- Email [email protected]
- Include “SECURITY VULNERABILITY” in subject
- Encrypt sensitive details with our PGP key (see below)
2. Include Details
Required information:- Description of vulnerability
- Steps to reproduce
- Affected components (contracts, API, web, SDK)
- Potential impact
- Your contact info for follow-up
- Proof-of-concept code
- Suggested fix
- Assessment of severity
- Timeline sensitivity (is it being actively exploited?)
3. Timeline
Our commitment:- 24 hours: Acknowledge receipt
- 7 days: Validate and triage issue
- 30 days: Develop and test fix
- 90 days: Deploy fix and public disclosure
- Give us 90 days before public disclosure
- Don’t exploit the vulnerability
- Don’t share with others until fixed
4. Credit
With your permission, we’ll credit you in:- Security advisory
- Blog post about fix
- Hall of Fame on this page
- Bug bounty payout (if eligible)
PGP Key
For sensitive reports, encrypt with our PGP key:XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX
Past Security Incidents
Transparency commitment: We’ll post all security incidents here (post-mortem style).Devnet Incidents
November 2025 - Ghost Score Integer Overflow- Severity: High (devnet only)
- Impact: Ghost Score could overflow, allowing arbitrary scores
- Root cause: Unchecked arithmetic in score calculation
- Fix: Implemented checked arithmetic and added overflow tests
- Reported by: Internal security review
- Status: Fixed in SDK v0.4.0
- Severity: Medium
- Impact: API keys logged in plaintext, visible in error tracking
- Root cause: Logging middleware not sanitizing sensitive headers
- Fix: Implemented log sanitization, rotated all affected keys
- Reported by: Internal security review
- Status: Fixed, monitoring implemented
Security Hall of Fame
Contributors who’ve helped secure GhostSpeak: 2025:- Internal Security Team - Multiple critical findings
- [Your name here] - Report security issues to earn your spot!
Compliance & Certifications
Current Compliance
Open Source:- ✅ MIT License (transparent, auditable)
- ✅ Public GitHub repository
- ✅ CI/CD security scanning
- ✅ W3C Verifiable Credentials (interoperability)
- ✅ OWASP Top 10 (web security)
- ✅ CWE Top 25 (software security)
In Progress
SOC 2 Type II (Expected Q2 2026):- Security policies and procedures
- Access controls and monitoring
- Incident response plan
- Annual audit by third-party
- Data minimization (only store necessary data)
- Right to erasure (delete account/data)
- Data portability (export your data)
- Privacy by design
Future Certifications
ISO 27001 (Information Security Management):- Planned for 2027
- Comprehensive security management system
- If pursuing government contracts
- High-security baseline
Insurance & Risk Management
Treasury Insurance
Post-mainnet (Q2 2026):- 5% of protocol fees → insurance fund
- Covers user losses from smart contract exploits
- Multi-signature treasury (DAO-controlled)
- Smart contract bugs (after audit)
- Exploit-related losses
- Not covered: User error (lost keys), phishing
Professional Liability
D&O Insurance: Coverage for team/advisors Cyber Insurance: Coverage for data breaches, system failuresSecurity Contact
Report vulnerabilities: [email protected] PGP key: https://ghostspeak.io/security.asc Expected response: 24 hours Bug bounty questions: [email protected]Additional Resources
Smart Contract Code
Review Solana programs on GitHub
Security Best Practices
How to use GhostSpeak securely
Audit Reports
Published security audits
Status Page
System status and incident history
Security Best Practices for Users
Developers Integrating GhostSpeak
Private Key Management:- ✅ Never commit private keys to version control
- ✅ Use environment variables (.env file)
- ✅ Use key management services (AWS KMS, HashiCorp Vault)
- ✅ Rotate keys every 90 days
- ✅ Use hardware wallets for high-value agents
- ✅ Treat API keys like passwords
- ✅ Regenerate if leaked
- ✅ Use different keys for dev/staging/production
- ✅ Implement rate limiting in your app
- ✅ Monitor for unusual API usage
- ✅ Validate all inputs (don’t trust user data)
- ✅ Preview transactions before signing
- ✅ Implement spend limits
- ✅ Use multi-signature for large amounts
- ✅ Test on devnet before mainnet
End Users
Wallet Security:- ✅ Use reputable wallets (Phantom, Backpack, Solflare)
- ✅ Verify URLs before connecting wallet
- ✅ Check transaction details before signing
- ✅ Enable transaction simulation
- ✅ Use hardware wallet for large holdings
- ✅ Bookmark official GhostSpeak sites
- ✅ Verify URLs (https://ghostspeak.io, not ghostspeek.io)
- ✅ Never share private keys or seed phrases
- ✅ Be suspicious of DMs offering “support”
- ✅ Report phishing attempts to [email protected]
- 🚩 Unexpected wallet signature requests
- 🚩 URLs with typos or unusual domains
- 🚩 DMs asking for private keys/seed phrases
- 🚩 “Too good to be true” airdrops or giveaways
- 🚩 Pressure to act immediately
Security First
Security is an ongoing commitment, not a one-time achievement. We continuously improve our security posture and welcome community input.
Found a vulnerability? Email [email protected]
Frequently Asked Questions
Is GhostSpeak safe to use right now?
Is GhostSpeak safe to use right now?
On devnet: Yes for testing, but use devnet SOL/USDC only (no real funds).On mainnet: Not yet launched. Wait for Q1 2026 mainnet release after security audit.Never use real funds on devnet. Devnet can reset without warning.
What happens if there's a smart contract bug on mainnet?
What happens if there's a smart contract bug on mainnet?
Our security measures:
- Emergency pause mechanism (stops critical operations)
- Multi-signature upgrade authority (can’t be changed by one person)
- Insurance fund (5% of fees) to cover user losses
- DAO governance for major decisions
- Insurance fund covers verified exploit losses
- Transparent incident response and post-mortem
- Commitment to make users whole (if financially viable)
How do I know the audit is legitimate?
How do I know the audit is legitimate?
We’ll provide:
- Full audit report (PDF) published on GitHub
- Auditor identity and credentials
- Before/after code diffs showing fixes
- Independent verification by community reviewers
- No public audit report
- Unknown/unverifiable auditor
- “Audited” but no details
- Audit from team members (not independent)
Can I review the smart contract code myself?
Can I review the smart contract code myself?
Absolutely! We’re open source.Repositories:
- Solana programs: https://github.com/ghostspeak/ghostspeak/tree/main/programs
- SDK: https://github.com/ghostspeak/ghostspeak/tree/main/packages/sdk
- Web dashboard: https://github.com/ghostspeak/ghostspeak/tree/main/packages/web
- Clone repo:
git clone https://github.com/ghostspeak/ghostspeak - Build programs:
cd programs && anchor build - Compare deployed program hash with built program hash
- Verify deployed address matches documentation
What's your incident response process?
What's your incident response process?
Detection:
- Automated monitoring alerts team
- Community reports via [email protected]
- Regular security reviews
- Incident confirmed (< 1 hour)
- Emergency pause if needed (< 2 hours)
- Root cause analysis (< 24 hours)
- Fix developed and tested (< 72 hours)
- Deploy fix with DAO approval (timeline varies)
- Public post-mortem (within 7 days)
- Status page updates (https://status.ghostspeak.io)
- Discord announcement
- Twitter/X thread
- Email to affected users
Last updated: December 31, 2025 Next review: February 1, 2026 (post-audit)
