Security

Security practices and considerations for SadClaw.

Architecture Security

On-Chain Security

  • Immutable program: Once deployed, the Solana program cannot be modified

  • Atomic transactions: USDC transfers and NFT minting happen atomically

  • Ownership verification: All operations verify NFT ownership

  • No admin keys: No backdoors or admin overrides

Off-Chain Security

  • Encrypted credentials: SSH keys encrypted at rest

  • Per-VM isolation: Each VM has unique credentials

  • HTTPS only: All API traffic is encrypted

  • JWT authentication: Wallet-signed authentication

VM Security

  • Isolated VMs: No shared resources between users

  • Firewall by default: Only SSH port open initially

  • Root access: You control the full machine

  • No shared keys: Unique SSH keys per VM

Wallet Security

Best Practices

  1. Use dedicated wallets - Don't use your main wallet for agents

  2. Limit funding - Only fund what the agent needs

  3. Hardware wallets - Use hardware wallets for large amounts

  4. Backup seed phrases - Store securely offline

Agent Wallets

For AI agents:

Key Storage

Never commit keys to version control:

Use environment variables:

VM Security

After Provisioning

  1. Update packages:

  1. Configure firewall:

  1. Disable root login (optional):

SSH Key Management

Rotate keys periodically:

Monitoring

Set up basic monitoring:

Smart Contract Security

Audit Status

[Audit information to be updated]

Verified Source

Source code is open and verified on GitHub:

github.com/techwebc/sadclaw/programs/sadclaw-vmarrow-up-right

Known Limitations

  • VMs are provisioned on centralized infrastructure (Hetzner)

  • Backend is a centralized service (can be unavailable)

  • NFT metadata stored off-chain

Reporting Vulnerabilities

Responsible Disclosure

If you find a security vulnerability:

  1. Do not open a public GitHub issue

  2. Include:

    • Description of the vulnerability

    • Steps to reproduce

    • Potential impact

    • Suggested fix (if any)

Response Time

  • Acknowledgment: Within 24 hours

  • Initial assessment: Within 72 hours

  • Fix timeline: Depends on severity

Bug Bounty

We offer bounties for valid security reports:

Severity
Bounty

Critical

Up to $10,000

High

Up to $5,000

Medium

Up to $1,000

Low

Up to $200

Compliance

Data Handling

  • We don't store personal data beyond wallet addresses

  • SSH keys are stored encrypted

  • Logs are retained for 30 days

  • No third-party analytics on sensitive data

Jurisdiction

SadClaw operates globally. Users are responsible for compliance with local regulations.

Last updated