Security & Vulnerability Disclosure

FrogTalk is vibe-coded but open source. If something looks off, broken, or exploitable — tell us. If you can write the fix, even better: send a PR. Community projects are only as safe as the community that audits them.

Community-secured · MIT-licensed · No bug bounty (yet) — full credit instead

What FrogTalk is, and how we build it

FrogTalk is a censorship-free chat platform where messages can stay private. No company sits in the middle; anyone can run a node; DMs are end-to-end encrypted so the server can't read them even if it's seized. That's the point of the project.

We're also building it in public with a development process we're openly experimenting with — the future of how small teams ship software with AI in the loop. We call our flow the deslop pipeline:

💡 Idea 🤖 AI slop (first draft) 🧹 Deslop (human review) 🚀 Ship

The first draft of most code is AI-generated. A human reviewer then deslops it: tightens the security, kills dead code, fixes lying comments, and actually exercises the change before it merges. Code is not considered done until it has been deslopped. The full checklist lives in CONTRIBUTING.md.

We're honest about this because users deserve to know the threat model. The encryption primitives are standard (ECDH-P256 → SHA-256 → AES-GCM-256, fresh 96-bit IV per message) but the surrounding plumbing is still being deslopped. Don't expect bank-grade security or privacy yet — especially in DMs. Help us get there.

Threat model: we assume the server can be compromised. DM bodies are end-to-end encrypted, keys never touch the server, recovery keys are 256-bit tokens stored as SHA-256 hashes only. If you find a way around that — please report it loudly.

How you can help (any of these are huge):

What counts as a vulnerability

Report a vulnerability

Use the form below. You can submit anonymously — we don't require an account — but including a contact (email, Matrix, GitHub handle, or a FrogTalk nickname) lets us ask follow-up questions and credit you when it's fixed.

For critical issues you'd rather not put in a web form, email security@frogtalk.xyz with as much detail as you can.

Reports are rate-limited (5/hour per address). Be specific — a good report saves us both time.
Please don't test exploits against the live production server beyond what's needed to confirm the bug. For destructive PoCs (mass-account creation, DoS), spin up a local instance — docker compose up from the repo gets you a full stack in about a minute.

Even better: send a patch

FrogTalk is MIT-licensed and lives on GitHub. If you can write the fix, we'd much rather review a PR than relitigate the bug in an issue tracker.

Our pipeline is honest: Idea → AI slop → Deslop (human review) → Ship. Most code starts as an AI draft; a human reviewer then tightens the security, fixes the dead code, and makes sure it doesn't break anything else before it merges. Read the full process & deslop checklist →
Community projects are up to all of us. Every reviewed PR, every triaged report, every responsible disclosure makes the platform safer for the next person who logs in. We notice, and we say thank you.

Hall of fame

Security researchers who've responsibly disclosed issues. Want to be on this list? See above.