We provide security updates for the following versions of Nethereum:
| Version | Supported |
|---|---|
| 5.8.x | ✅ |
| < 5.8 | ❌ |
If you've discovered a security vulnerability in Nethereum, we appreciate your help in disclosing it to us in a responsible manner.
Please do not open a public issue for security vulnerabilities.
Instead, please report vulnerabilities by:
- Opening a draft security advisory on GitHub under the "Security" tab.
- Or by emailing the core maintainer at [email protected].
Please include the following information in your report:
- A description of the vulnerability.
- Instructions on how to reproduce the issue.
- Potential impact of the vulnerability.
We will acknowledge your report within 48 hours and work with you to analyze and address the issue.
When using Nethereum to handle sensitive key material:
- Memory Management: Use
usingblocks or manually callDispose()onEthECKeyinstances (available from version 5.8.x) to ensure that temporary byte buffers are cleared from memory. - Buffer Safety: When passing private keys as
byte[], ensure you clear the source buffers usingArray.Clear()orCryptographicOperations.ZeroMemory()after the operations are complete. - Key Storage: Use hardware wallets (Ledger/Trezor) or secure enclaves (AWS KMS/Azure Key Vault) for high-value production environments rather than storing raw private keys in application memory.