SOC 2 CertifiedGDPR CompliantISO 27001WCAG AAA
24/7 Enterprise SupportLog In
Security Transparency

Security Advisories

Official security advisories, vulnerability disclosures, and incident responses for TapsIM's encrypted messaging platform and federation server infrastructure.

3
Total Advisories
+0 this month
0
Critical/High Severity
Zero active
2.3 days
Avg Resolution Time
98% within SLA
0
Zero-Day Incidents
All-time record

Security Timeline

Recent security events, enhancements, and incident responses

πŸ”§

P9 Observability Framework Release

2024-12-15

Major security enhancement with comprehensive monitoring and chaos resilience

⚠️

Federation Deduplication Fix

2024-11-28

Resolved low-severity race condition in message deduplication

πŸ”§

Advanced Key Management

2024-10-12

Implemented P7 key rotation and transparency features

πŸ”

Q3 Security Audit Completed

2024-09-01

Comprehensive third-party security assessment with zero critical findings

Published Advisories

Comprehensive security advisories with technical details and remediation guidance

πŸ“‹
informational

P9 Observability Framework Hardening

TAPS-SA-2024-001β€’Published: 2024-12-15β€’
RESOLVED

Description

Proactive security enhancement in P9 milestone implementation including comprehensive observability stack, chaos resilience framework, and advanced logging with sensitive data redaction.

Impact Assessment

No security vulnerability identified. This advisory documents security improvements implemented in the P9 milestone.

Technical Details

  • Implemented OpenTelemetry distributed tracing with X-Taps-Trace-Id propagation
  • Added comprehensive metrics collection with 12 federation-specific metrics
  • Enhanced structured logging with frame/federation/crypto context redaction
  • Deployed chaos engineering framework with 10 event types for resilience testing
  • Integrated property-based testing with 4 fuzzing strategies

Remediation Steps

  1. 1
    Upgrade to Federation Server v1.9.0 or later
  2. 2
    Review observability configuration for your deployment
  3. 3
    Enable distributed tracing in production environments
  4. 4
    Configure chaos testing framework for development/staging

Advisory Details

Advisory ID
TAPS-SA-2024-001
Published
2024-12-15
Affected Versions
Federation Server v1.0.0 - v1.8.x
Fixed In
v1.9.0 (P9 Release)

Security Contact

24/7 security hotline for critical issues
ℹ️
low
CVE-2024-XXXXX

Federation Message Deduplication Edge Case

TAPS-SA-2024-002β€’Published: 2024-11-28β€’
RESOLVED

Description

An edge case in the federation message deduplication logic could potentially allow duplicate message processing under specific timing conditions.

Impact Assessment

Low impact: In rare race conditions with high-frequency message sending, duplicate messages could be processed, potentially causing message ordering inconsistencies.

Technical Details

  • Race condition in (origin, frame.id) deduplication map during concurrent writes
  • Affects high-throughput federating servers under specific timing windows (~100ms)
  • No data corruption or unauthorized access - only potential message duplication
  • Issue identified through P8 chaos engineering stress testing

Remediation Steps

  1. 1
    Upgrade to Federation Server v1.8.0 immediately
  2. 2
    Review message logs for any duplicate entries between Nov 20-28, 2024
  3. 3
    Apply rate limiting if experiencing high-frequency federation traffic
  4. 4
    Contact [email protected] for assistance with impact assessment

Advisory Details

Advisory ID
TAPS-SA-2024-002
CVE ID
CVE-2024-XXXXX
Published
2024-11-28
Affected Versions
Federation Server v1.0.0 - v1.7.x
Fixed In
v1.8.0

Security Contact

24/7 security hotline for critical issues
πŸ“‹
informational

E2EE Key Rotation Security Enhancement

TAPS-SA-2024-003β€’Published: 2024-10-12β€’
RESOLVED

Description

Implementation of advanced key management and rotation capabilities as part of P7 milestone security enhancements.

Impact Assessment

Security enhancement: Improved key hygiene with offline root keys and short-lived online keys for enhanced forward secrecy.

Technical Details

  • Implemented offline root β†’ short-lived online key hierarchy
  • Added key transparency log integration
  • Enhanced forward secrecy with automatic key rotation
  • Introduced key escrow protection for enterprise deployments

Remediation Steps

  1. 1
    Upgrade to Federation Server v1.6.0 or later
  2. 2
    Configure key rotation policies per organizational requirements
  3. 3
    Enable key transparency logging in production environments

Advisory Details

Advisory ID
TAPS-SA-2024-003
Published
2024-10-12
Affected Versions
All versions prior to v1.6.0
Fixed In
v1.6.0

Security Contact

24/7 security hotline for critical issues

Stay Informed About Security

Subscribe to security notifications and access additional security resources to stay updated on the latest advisories and best practices.

Responsible disclosure policy
90-day disclosure timeline
Up to $50,000 rewards