Skip to main content
Mullvad takes the security of our VPN app seriously. As a privacy-preserving VPN client, the app goes to great lengths to stop traffic leaks and defaults to secure/private options.

Secure Development

Since the security of the users of the app is a top priority, by extension the security of the development and release process also becomes a top priority. This is something we work actively on.

OpenSSF Best Practices Badge

The Mullvad VPN app has achieved the OpenSSF (Open Source Security Foundation) Best Practices badge, demonstrating our commitment to secure development practices. OpenSSF Best Practices View our OpenSSF Best Practices project page to see all the criteria we meet.

Code Signing Requirements

All merge commits to the main branch must be PGP signed. Certain security-critical files require signatures on every commit that changes them. See Code Signing Requirements for detailed information about git signature requirements.

Security Audits

Mullvad performs independent third party security audits of the entire app every second year. We also conduct smaller, more specialized audits for certain features.

Audit Process

Our security audit process includes:
  1. Biannual Full Audits: Complete security review of the entire application every two years
  2. Feature-Specific Audits: Targeted audits for security-critical features and changes
  3. Penetration Testing: Regular pentests by external security experts
  4. Public Disclosure: All audit results are made public in their unredacted original form

Completed Audits

We’ve performed the following external security audits:
  • 2018-09-24 - Assured and Cure53
  • 2020-06-12 - Cure53
  • 2022-10-14 - Atredis
  • 2024-12-10 - X41 D-Sec

Additional Audits and Certifications

Apart from the biannual audits, we’ve also conducted:
  • 2025-02-24 - NCC Group Mobile Application Security Assessment (MASA) of the Android app
  • 2025-03-20 - Audit of the installer downloader by Assured
All audit reports are available in their unredacted original form in the audits directory for full transparency towards users.

Reporting Security Vulnerabilities

We welcome security researchers, customers, and anyone else to scrutinize the source code of our products and report any issues they find to us.

Responsible Research and Disclosure

We ask you to carry out responsible research and disclosure. This includes, but is not limited to refraining from:
  • Denial of service attacks against API endpoints used by the app
  • Trying to disrupt the Mullvad VPN service
  • Publicly disclosing vulnerabilities before reporting them to us in private

Before Reporting

Before reporting issues, we recommend that you read:

How to Submit Security Issues

Please do not report security vulnerabilities through GitHub issues or other public channels.
To report a security vulnerability, use one of these private channels: Create a vulnerability report on GitHub This is the preferred method as it allows us to coordinate privately before public disclosure.

Option 2: Email

Email our support team at [email protected]
For sensitive reports, we recommend encrypting your email with our support PGP key.

Security Resources

Developer Keys

You can find our developer keys and code signing keys on Mullvad’s Open Source page. This page includes:
  • PGP keys for all Mullvad developers
  • Instructions for cryptographic verification of downloads
  • Code signing certificates

Security Documentation

User Security and Privacy

The Mullvad VPN app is a privacy preserving VPN client. As such it goes to great lengths to stop traffic leaks, and basically all settings default to the more secure/private option.
Users have to explicitly allow more loose rules if desired. See the dedicated security document for details on what the app blocks and allows, as well as how it does it.

Bug Bounty Program

While we don’t currently have a formal bug bounty program, we greatly appreciate security researchers who responsibly disclose vulnerabilities to us. We take all reports seriously and will work with you to understand and address the issue.

Build docs developers (and LLMs) love