The following versions of Brave Sync Notes are currently supported with security updates:
| Version | Supported |
|---|---|
| 2.2.x | ✅ |
| 2.1.x | ✅ |
| 2.0.x | ❌ |
| < 2.0 | ❌ |
We take security seriously. If you discover a security vulnerability, please report it responsibly.
Please DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please report security issues via:
- Email: Create a private security advisory
- Or use GitHub's Private Vulnerability Reporting
When reporting a vulnerability, please include:
- Description: A clear description of the vulnerability
- Impact: What could an attacker do with this vulnerability?
- Reproduction: Step-by-step instructions to reproduce the issue
- Environment: Version, OS, browser (if applicable)
- Suggested Fix: (Optional) If you have suggestions for fixing the issue
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Fix Timeline: Depends on severity and complexity
- Critical: 1-2 weeks
- High: 2-4 weeks
- Medium: 1-2 months
- Low: Next release
When using Brave Sync Notes:
- Keep your mnemonic phrase secure - It's the only way to recover your encrypted notes
- Use strong passwords if additional authentication is enabled
- Keep dependencies updated - We monitor and update dependencies regularly
- Use HTTPS in production deployments
- Regular backups - Export your notes periodically
Brave Sync Notes implements the following security measures:
- End-to-End Encryption: Client-side AES-256-GCM encryption
- Zero-Knowledge Architecture: Server never sees plaintext or encryption keys
- Secure Key Derivation: Password-based key derivation using PBKDF2
- Mnemonic Recovery: BIP39-based 12-word recovery phrase
Security updates will be announced through:
- GitHub Security Advisories
- Release notes (marked as "Security Fix")
- CHANGELOG.md updates
We thank the following individuals for responsibly disclosing security issues:
(This list is currently empty - be the first!)