Mullvad's new GotaTun WireGuard implementation passes its first independent security audit – here's what you need to know

Mullvad VPN "mole" logo, with dark blue "Mullvad VPN" text on white background
(Image credit: Mullvad VPN)

Mullvad's new WireGuard implementation, GotaTun, has undergone its first independent security audit.

The protocol is used in the VPN's Android apps and "no major vulnerabilities were found." Assured Security Consultants completed the audit at the beginning of 2026, and tests covered most, but not all, of GotaTun v0.2.0.

"No major vulnerabilities found"

GotaTun's audit took place between January 19 and February 15, 2026, with Mullvad publishing the results on March 6, 2026.

DAITA, the GotaTun CLI, and "external dependencies" were not part of the audit. However, the rest of GotaTun v0.2.0 were subject to an assessment by Assured Security Consultants.

The group said "GotaTun has no major vulnerabilities," and two low severity issues were identified.

Most of the recommendations were fixed before the audit was published, including those for the low-severity findings. Mullvad said some of the notes "did not require immediate attention."

What were the findings?

With GotaTun, 24 bits of the WireGuard session identifiers were static. The remaining eight were "a predictable counter which increased with every new session." This deviates from WireGuard's own specification, which recommends generating a random 32-bit integer for each session.

Mullvad said this was inherited from BoringTun – the original WireGuard in Rust project – and it has been patched to conform to the WireGuard specification. Mullvad said the issue "likely did not provide much information to a passive observer" and it was one of the two "low" risk vulnerabilities.

The second low-risk vulnerability concerned packet padding. According to the WireGuard specification, packets should be padded prior to encryption, with their lengths divisible by 16. Mullvad confirmed it had updated its code "to always pad the payload before encrypting it."

WireGuard

(Image credit: WireGuard)

It was noted that, "in most cases," GotaTun "did not correctly begin sending packets to the new address" if a user's IP address changed. It therefore wasn't handling the roaming of users correctly.

Mullvad said this doesn't affect the Mullvad VPN as its "servers never change IP addresses during an active WireGuard session." However, the VPN decided the issue was important enough to fix.

All Mullvad's fixes are available in GotaTUn v0.4.0. The VPN said it has "even more confidence in the reliability of GotaTun" following this audit. Its rollout across remaining platforms remains on track for 2026.

Mullvad published the full results of GotaTun's audit on its website.

Disclaimer

We test and review VPN services in the context of legal recreational uses. For example: 1. Accessing a service from another country (subject to the terms and conditions of that service). 2. Protecting your online security and strengthening your online privacy when abroad. We do not support or condone the illegal or malicious use of VPN services. Consuming pirated content that is paid-for is neither endorsed nor approved by Future Publishing.

George Phillips
Staff Writer

George is a Staff Writer at Tom's Guide, covering VPN, privacy, and cybersecurity news. He is especially interested in digital rights and censorship, and its interplay with politics. Outside of work, George is passionate about music, Star Wars, and Karate.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.