Kebo is a personal finance application. We treat security and privacy issues with high priority.
We provide security fixes for supported versions only.
| Version | Supported |
|---|---|
| Latest release | ✅ |
| Older releases | ❌ |
If you are running an older version, please upgrade before reporting unless the issue prevents upgrading. If you need a longer support window (e.g., “latest minor + previous minor”), update the table accordingly.
We take security vulnerabilities seriously. Please report issues responsibly and privately.
Instead, email security@kebo.app.
If you believe the issue is actively being exploited, include “URGENT” in the subject.
Please include as much of the following as possible:
- Description of the vulnerability and why it matters
- Affected component(s) (mobile app, backend/API, authentication, storage, build/release pipeline, etc.)
- Affected version(s) (app version, commit SHA, and platform: iOS/Android)
- Steps to reproduce (ideally a minimal PoC)
- Impact (what an attacker can do) and any constraints/assumptions
- Suggested fix / mitigation (if you have ideas)
- Any logs or screenshots — redacted (see “Data handling” below)
- Do not send real financial data (statements, account numbers, transaction history tied to a person, credentials, tokens).
- Do not access other users’ data. Test only with accounts and data you own and are authorized to use.
- Redact screenshots/logs thoroughly (names, emails, account IDs, tokens, addresses, unique identifiers).
- Acknowledgment: within 2 business days
- Triage: initial assessment within 7 days
- Status updates: at least every 7 days until resolution or a plan is agreed
- Fix targets (guideline):
- Critical: mitigation or fix as soon as practical, typically ≤ 14 days
- High: typically ≤ 30 days
- Medium/Low: scheduled based on risk and release cadence
- Credit: we’ll credit you in release notes/advisory unless you prefer anonymity
We prefer coordinated disclosure. Unless otherwise agreed:
- Please allow up to 90 days before public disclosure.
- If we need more time (complex fix), we’ll propose a revised timeline and keep you updated.
If you want to encrypt your report, request our PGP key by emailing security@kebo.app (or publish the key fingerprint here).
Examples include (not limited to):
- Authentication/authorization flaws (session/token issues, privilege escalation)
- Sensitive data exposure (PII/financial data in logs, storage, caches, screenshots, crash reports)
- Insecure local storage (tokens, secrets, exported files, backups)
- Insecure network communication (TLS misconfiguration, MITM risks, missing cert validation)
- Injection vulnerabilities (SQL/NoSQL injection, command injection, etc.)
- XSS/CSRF (for any web surfaces, admin panels, or embedded web views)
- Broken access control in APIs (IDOR, mass assignment)
- Deep link / URL scheme vulnerabilities and app-to-app communication issues
- Supply-chain or CI/CD risks (malicious dependency updates, leaked build secrets)
- Social engineering attacks (phishing, vishing)
- Physical device attacks (unless a software weakness makes them significantly easier)
- Denial of Service (DoS) without a demonstrated security impact
If you’re unsure whether something is in scope, report it anyway — we’ll triage.
- If a vulnerability in a dependency is exploitable in Kebo, please report it to us.
- If it does not affect Kebo directly, report it upstream to the dependency maintainers.
When contributing:
- Never commit secrets
- Use environment variables and secret managers; rotate any leaked keys immediately.
- Redact logs
- Do not log credentials, tokens, account identifiers, or transaction details.
- Avoid
console.logfor anything that could include sensitive fields.
- Validate & sanitize input
- Treat all inputs as untrusted (including imported CSV/OFX files).
- Protect privacy by default
- Use mock/test data in screenshots and test fixtures.
- Keep dependencies updated
- Prefer pinned versions; review changelogs for security-sensitive upgrades.
This application implements:
- Secure token storage using
expo-secure-store - Automatic token refresh (where applicable)
- Environment-based configuration
- Development-only logging (avoid sensitive logs in production builds)
Note: secure storage behavior can vary by platform and device state. Avoid storing more than necessary and prefer short-lived tokens.
Security reports: security@kebo.app