We support only the latest release. Google Play users: enable automatic updates. F-Droid users: note that F-Droid releases may lag by days or weeks — for critical fixes, download directly from GitHub Releases.
| Version | Supported |
|---|---|
| Latest (Google Play) | ✅ |
| Latest (GitHub Releases) | ✅ |
| Older versions | ❌ |
Please do NOT open public issues for security vulnerabilities.
Contact: hello@urik.io
Include in your report:
- Description of the vulnerability
- Steps to reproduce
- Potential impact (privacy, data exposure, etc.)
- Affected versions (if known)
- Suggested fix (optional)
Response timeline:
- Initial acknowledgment: Within 48 hours
- Status update: Within 7 days
- Fix deployment: Varies by severity (critical issues prioritized)
What happens after you report:
- We'll confirm receipt and assess severity
- We'll develop and test a fix
- We'll deploy the patch via Google Play update
Urik is a privacy-first keyboard with:
- Zero network activity
- Local-only data storage (SQLCipher encrypted)
- No analytics or telemetry
- No cloud sync
In scope:
- Input handling vulnerabilities
- Data leakage (logs, IPC, broadcasts)
- Encryption implementation issues
- Privilege escalation
- Dependency vulnerabilities
Out of scope:
- Attacks requiring full filesystem access on a physically compromised device (e.g., rooted device with direct DB access)
- Social engineering attacks
- Issues in upstream dependencies (report to maintainers)
- Theoretical attacks without practical exploit
We appreciate security researchers who follow responsible disclosure. We're happy to credit you in release notes (if you wish to be named).