Every session on Helius Network is protected by three independent security layers:
All API communication uses TLS 1.3. HSTS is enforced with a minimum age of 1 year. Certificate pinning is available for Enterprise mobile deployments.
API keys are stored as salted SHA-256 hashes — we never store plaintext keys. Keys displayed in the dashboard are shown once at creation. Use environment variables, never hardcode keys in client-side code.
If you discover a security vulnerability, please report it to security@heliusnetwork.com. We aim to respond within 24 hours and will coordinate a fix before public disclosure. We do not pursue legal action against good-faith researchers.
HeliusOS installed on user machines transmits only anonymised threat signatures to support@heliusnetwork.com. Signatures include: threat category, severity level, and a hash of the affected file path. No file contents, credentials, or personal data are ever transmitted. Reporting can be disabled at any time from the HeliusOS system dashboard.
Critical vulnerabilities in the PoL algorithm or authentication system may be eligible for rewards. Contact security@heliusnetwork.com with details.
© 2026 Helius Network