Security First

Enterprise-Grade Security

Your assets are protected by multiple layers of security, independently audited by top blockchain security firms.

Security Audits

CertiK

December 2025

95/100
Score
Passed

No critical issues found

View Full Report

PeckShield

November 2025

93/100
Score
Passed

2 minor issues resolved

View Full Report

Hacken

October 2025

9.8/10
Score
Passed

All findings addressed

View Full Report

Security Features

End-to-End Encryption

All sensitive data is encrypted using AES-256 encryption both at rest and in transit.

Non-Custodial Architecture

Your private keys never leave your device. We cannot access your funds.

Hardware Wallet Support

Compatible with Ledger and Trezor for maximum security.

Biometric Authentication

Optional fingerprint and face recognition for mobile devices.

Secure Backup

Encrypted backup with 12/24-word recovery phrase following BIP39 standard.

Multi-Signature Support

Enable multi-sig wallets requiring multiple approvals for transactions.

Security Best Practices

  • Never share your recovery phrase with anyone, including NOXGuard support
  • Enable all available security features (2FA, biometrics, PIN)
  • Keep your app updated to the latest version
  • Verify transaction details carefully before signing
  • Use hardware wallets for large holdings
  • Store recovery phrase offline in a secure location
  • Be cautious of phishing attempts and fake websites
  • Only download NOXGuard from official sources

Bug Bounty Program

Help us keep NOXGuard secure. We reward security researchers who responsibly disclose vulnerabilities.

Up to $50K
Critical Vulnerabilities
Up to $10K
High Severity
Up to $2K
Medium/Low Severity
Report a Vulnerability

Compliance & Standards

Industry Standards

  • • BIP32/BIP39/BIP44 compliance for HD wallets
  • • EIP-1559 support for Ethereum transactions
  • • WCAG 2.1 AA accessibility standards
  • • ISO 27001 security management practices

Privacy & Data

  • • GDPR compliant data handling
  • • Zero-knowledge architecture
  • • No tracking or analytics without consent
  • • Regular third-party security assessments