Leaked: Source Code for Trump Officials’ Unofficial Signal App Exposes Vulnerabilities

7159

The source code for TM SGNL, an unofficial Signal app reportedly used by former Trump administration officials, has been leaked online, revealing hardcoded credentials and potential security flaws. This app was reportedly used by figures such as Mike Waltz, and possibly Pete Hegseth, JD Vance, and Tulsi Gabbard.

Source Code Released

Security researcher Micah Lee highlighted the availability of the source code after a URL, https://www.telemessage.com/wp-content/uploads/2024/12/Signal.zip, was shared privately. The file contains the Android source code for the application. Subsequently, links to both the Android and iOS versions of the TM SGNL Archiver source code were found on the TeleMessage website:

GPLv3 License

The code is licensed under GPLv3, granting rights to access, analyze, modify, and redistribute the code, provided any derivative work is released under the same license.

Mirrored Repositories

Given the potential implications of high-profile officials using a modified version of Signal, mirrored repositories have been created on GitHub for easier access:

Android Code Analysis

Analysis of the Android version reveals a complete Git history, including contributor email addresses such as [email protected], [email protected], and [email protected]. The original Git origin pointed to a private GitLab server: https://TMGitlab.telemessage.co.il/client/Android/signalarchiver.git.

Vulnerabilities Discovered

The source code reportedly contains hardcoded credentials and other vulnerabilities, raising concerns about the security of communications conducted through the app.

Stay tuned for further analysis and updates on this developing story.

Content