Skip to main content

Security Audit

This page documents the security audit status and known limitations for the Hadinet Document Vault.

Audit Status

info

Security audits are planned but have not yet been completed. This page will be updated with audit reports, findings, and remediation details as they become available. The Hadinet team is committed to third-party security review before the vault reaches general availability.

Planned Audit Scope

The planned security audit is expected to cover the following areas:

Cryptographic Implementation

  • AES-256-GCM encryption correctness
  • Key derivation implementation
  • Random number generation quality

TEE Security

  • Enclave configuration and memory protection
  • Key lifecycle (proper zeroing after use)
  • Remote attestation implementation

Storage Security

  • IPFS integration and private gateway configuration
  • On-chain metadata and access control enforcement
  • Data integrity (end-to-end)

Access Control

  • Wallet authentication and signature verification
  • Time-limited, revocable access grant logic
  • Authorization enforcement

Known Limitations

The following are known limitations of the vault's security model, documented transparently:

No Key Recovery

If a user loses access to their wallet, their documents are permanently inaccessible. This is a deliberate design decision prioritizing security over recoverability. Users should maintain secure backups of their wallet seed phrases.

IPFS Persistence After Deletion

Unpinned files on IPFS may persist on third-party IPFS nodes that have cached them. Since all files are encrypted, this does not constitute a confidentiality breach, but the ciphertext may remain accessible for an indeterminate period after deletion.

On-Chain Metadata Permanence

On-chain metadata cannot be deleted due to blockchain immutability. While this metadata contains no PII, it does reveal that a document of a certain type was uploaded at a certain time by a certain DID.

TEE Vendor Trust

The vault's security model relies on the correctness of the TEE hardware and firmware. A compromise at the hardware vendor level could theoretically affect the TEE's guarantees. Remote attestation mitigates this by allowing clients to verify the TEE's integrity.

Reporting Security Issues

If you discover a security vulnerability in the Document Vault, please report it responsibly through Hadinet's security contact channels. Do not disclose the vulnerability publicly before the team has had a chance to address it.