The protocol is the threat model.
Cloak's privacy guarantees are only as strong as the code enforcing them. This page is the index of our audit trail, bug bounty program, and responsible-disclosure policy. Everything is public, reproducible, and signed.
Third-party review
Every circuit and settlement contract ships with an audit report. Reports are linked below with full text and remediation status.
Halborn
Least Authority
Zellic
Immunefi · always-on
Administered via Immunefi. Severity ladder matches Immunefi Vulnerability Severity Classification v2.3 for DeFi. Scope covers all repos under cloakfi/* and the deployed Solana program.
How to report
- STEP 01
Gather the details
Describe the vulnerability, affected component, estimated severity, and reproduction steps. Include PoC code or transaction hashes where applicable.
- STEP 02
Encrypt and send
Email security@cloak.app, encrypted with our PGP key (fingerprint 4E2A 7B19 3F0A DD44 C021 9E82 1E7B FF9D). Or file a private advisory on GitHub via /security/advisories/new.
- STEP 03
Acknowledgement · 48 hours
We confirm receipt and assign a severity within two business days. You get a tracking ID and a triage engineer.
- STEP 04
Coordinated fix
We develop a fix, coordinate with relayer operators, and schedule a protocol upgrade. Embargo windows for critical issues are typically 14–30 days.
- STEP 05
Publish
Full advisory, credit, and bounty payment on disclosure day. Every resolved report is catalogued at cloakfi/advisories.
Pinned · reviewed · reproducible
All cryptographic dependencies are pinned, vendored where possible, and verified against upstream release signatures. We do not pull from unfrozen tags.
security@cloak.app
PGP · 4E2A 7B19 3F0A DD44 C021 9E82 1E7B FF9D