Securing your data is our top priority. We implement comprehensive security practices and welcome contributions from security researchers.
We've built our infrastructure with security in mind, using industry-best practices and modern cloud technologies to protect your data.
Your data is protected both in transit and at rest:
Our S3 implementation includes versioning for protection against accidental deletions, object-level logging for security audits, and cross-region replication for data resilience.
We use Supabase with PostgreSQL and advanced security protections:
Supabase provides enterprise-grade PostgreSQL with built-in Row-Level Security (RLS) that ensures users can only access data they're authorized to see. Every database query is automatically filtered through security policies at the database level.
We leverage Vercel's enterprise-grade platform security:
Vercel's enterprise security features provide protection against common web attacks, with advanced edge caching and security headers automatically implemented.
We use Supabase Auth to provide robust identity protection:
Supabase Auth provides enterprise-grade authentication with automatic JWT validation, secure session management, and seamless integration with our Row-Level Security policies to ensure authenticated users only access their authorized data.
Our development practices enforce security at every stage:
We employ a shift-left security approach, integrating automated security testing into our CI/CD pipeline. This enables us to identify and remediate potential vulnerabilities before they reach production.
Security is a journey, not a destination. We're continuously improving our security posture by implementing new protections, conducting regular security assessments, and enhancing our practices based on emerging threats and industry standards.
Help us strengthen our security by reporting vulnerabilities. We value the contributions of security researchers and currently offer recognition rewards while we prepare for our funding round.
Our bug bounty program is not yet fully operational. We will launch with monetary rewards after securing company funding. Security researchers can still report vulnerabilities and will be compensated with exclusive Dib.io stickers and t-shirts until monetary bounties become available.
Email us directly with your security findings
You can send your security vulnerability reports directly to our security team at: security@dib.io
Please include detailed information about the vulnerability, steps to reproduce, and potential impact.
While we prepare for our funding round, we currently offer recognition-based rewards for security researchers. Once funded, we will transition to competitive monetary rewards based on severity and impact.
Recognition Package
Post-Funding Program
We appreciate the patience of security researchers as we work toward launching our full monetary bounty program. All reports submitted during this pre-launch phase will be eligible for retroactive consideration once our program is fully funded.
Our bug bounty program covers:
We ask that you follow responsible disclosure practices:
When conducting vulnerability research according to our bug bounty program guidelines, we will not:
This safe harbor applies as long as your security research:
Note: If legal action is initiated by a third party against you and you have complied with our bug bounty policy, we will make this fact known where we have the authority to do so.
If you have any questions about our security practices or bug bounty program, please email us at security@dib.io
We follow the security.txt standard. Our security contact information can also be found at .well-known/security.txt