Security is a shared responsibility. We operate a small, security-conscious service and rely on Cloudflare for the bulk of infrastructure protections. On top of that, we apply engineering and operational controls to protect user data and keep the service available and resilient.
Cloudflare provides global edge network protections including DDoS mitigation, TLS, a Web Application Firewall (WAF), and routing isolation.
User content is stored on Cloudflare R2 and application data is stored in D1. Access to these services is restricted and audited.
We use TLS for data in transit. Data at rest protections are provided by Cloudflare for the storage and database services we use.
We review code, apply dependency updates, and run automated tests and linters as part of our CI. Sensitive operations are logged and access is limited to authorized personnel.
We maintain incident response procedures, monitor for anomalous activity, and will notify affected users if a security incident requires disclosure.
We welcome reports from security researchers and the community. We follow a coordinated vulnerability disclosure process (we do not use the term "responsible disclosure"). Our goal is to acknowledge reports quickly, work with reporters to verify and remediate the issue, and then coordinate public disclosure once fixes are in place.
Please send security reports to security@exposera.com. When possible include:
Note: timelines depend on issue complexity and the need to coordinate with third-party providers (we rely on Cloudflare for infrastructure protections). We will not take legal action against good-faith security researchers who follow this policy.
For machine-readable contact information and policy discovery, see our security.txt in the site root: /security.txt or the canonical policy URL: https://exposera.com/security.
If you have other security questions, please email security@exposera.com.