| Version | Supported |
|---|---|
| 0.1.x | ✅ |
The Kala team takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
- DO NOT create a public GitHub issue for security vulnerabilities
- Email security concerns to the project maintainer directly
- Include as much detail as possible:
- Type of vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment within 48 hours
- Regular updates on progress
- Credit in the release notes (unless you prefer anonymity)
Kala is designed with security and privacy as core principles:
- Zero Data Collection: All processing happens locally on your device
- No External Servers: No data ever leaves your browser
- Minimal Permissions: Only requests necessary permissions
- Open Source: Full code transparency for security audits
- Production Logging: Console logs are removed in production builds
- Extension Fingerprinting: Kala actively hides its presence from tracker scripts
- Timing Attacks: Performance.now() is coarsened to prevent timing analysis
- Message Validation: All internal messages are validated before processing
- Storage Limits: Automatic cleanup prevents storage exhaustion attacks
The codebase has undergone internal security review with the following scores:
- Security Score: 9.5/10
- Efficiency Score: 9.0/10
See ADVANCED_SECURITY_IMPLEMENTATION.md for detailed security documentation.
We kindly ask that you:
- Give us reasonable time to address the issue before public disclosure
- Make a good faith effort to avoid privacy violations and data destruction
- Do not exploit any vulnerability beyond what is necessary to demonstrate the issue