Passary Logo
Passary
SECURITY CENTER

Security Advisories
& Hall of Fame

A permanent record of security notifications, resolved vulnerabilities, and the researchers who help keep Passary secure.

01

Uncompromising Transparency

At Passary, valid security research is not a threat—it is a vital component of our defense strategy. We operate with a security-first mindset that prioritizes protecting user data above reputation or convenience. Our local-first, zero-knowledge architecture ensures that we cannot access user data, but we rely on the global security community to help verify the integrity of the systems that surround it.

We are committed to full transparency regarding security issues. When vulnerabilities are confirmed, we fix them, we disclose them, and we credit the researchers effectively. We do not hide implementation errors; we fix them and learn from them publicly.

02

Coordinated Disclosure

We adhere to industry-standard coordinated disclosure practices to ensure user safety while respecting researcher contributions.

Rapid Acknowledgment

We acknowledge all security reports within 24–48 hours of receipt.

Thorough Assessment

Our security team provides an initial technical assessment and validity confirmation within 5 business days.

Public Disclosure

We target a 90-day disclosure window for fixed vulnerabilities, or sooner by mutual agreement.

Researcher Credit

We provide permanent, public credit in our advisories and Hall of Fame.

03

Security Bulletins

LIVE TERMINAL
PASSARY-2025-001MediumFixed

Direct access via origin IP address

REPORTED: 2025-12-25
FIXED: 2025-12-26
DISCLOSED: 2025-12-26
Description

The Passary web application was accessible directly via its origin IP address instead of being restricted to the official domain (passary.com). This allowed the application to respond to HTTP and HTTPS requests addressed to the IP rather than enforcing hostname-based access control.

Impact

Direct IP access could allow attackers to interact with the application outside of the intended domain-based access path, increasing exposure to automated scanning and bypassing hostname-based security controls.

No user data was exposed, and the integrity of Passary’s encrypted, local-only vaults was not affected.

Remediation
  • The web server configuration was updated to explicitly block all HTTP and HTTPS requests addressed to the origin IP or unknown hostnames.
  • Only requests for the official Passary domain are now served. All direct IP requests are rejected at the web server layer.
Affected

Web Server Configuration, Application Infrastructure (HTTP/S entry point)

Root Cause

The web server configuration did not explicitly restrict incoming HTTP and HTTPS requests to the official domain hostname, allowing the application to be served when accessed directly via the origin IP address.

Credit
04

Hall of Fame

We gratefully acknowledge the following security researchers who have responsibly disclosed vulnerabilities to us. Their expertise and integrity have made Passary safer for everyone. Entries in this Hall of Fame are permanent.

ResearcherContributionYear
Jay MehtaResponsible disclosure of origin IP infrastructure exposure2025
05

Response Timeline

Acknowledgment24-48 Hours
Assessment5 Days
RemediationPriority Based
Disclosure90 Days
06

Severity Scale

Critical
Direct risk to data confidentiality/integrity
High
Unauthorized access or logic manipulation
Medium
Non-critical component or complex exploit
Low
Minor issues or best-practice deviations

Contributing to Security?

Passary Security Team • PGP: [Coming Soon]