kAIxU SuperIDE

Security Policy

Skyes Over London LC  ·  Last updated: March 1, 2026  ·  Reviewed quarterly

Security is foundational to kAIxU. This document describes the technical and organisational controls we implement to protect your data. To report a security vulnerability, email security@kaixu.app — we respond within 24 hours and operate a responsible disclosure process.

1. Infrastructure

Hosting

Application layer: Netlify (SOC 2 Type II certified). Serverless functions run in isolated Node.js 20 runtimes with no persistent process state.

Database

Neon PostgreSQL — encrypted at rest (AES-256), isolated per-project, automatic backups with point-in-time recovery. Read replicas optionally enabled.

AI Gateway

All AI inference routes through the proprietary kAIxU gateway — a hardened Cloudflare Worker. Vendor API keys never leave the gateway. Clients authenticate with short-lived Bearer tokens.

Network

All traffic requires TLS 1.2 minimum. HSTS enforced with 2-year max-age and preload. No plaintext HTTP accepted in production.

2. Authentication and Access Control

ControlImplementationStatus
Password hashingbcrypt, adaptive cost factor 12✓ Active
Session tokensJWT HS256, 14-day expiry, server-side revocation✓ Active
Multi-factor authenticationTOTP (RFC 6238); per-account, optional✓ Active
SSO (enterprise)SAML 2.0 + OIDC (Google, Microsoft, Okta); JIT provisioning✓ Active
Role-based accessowner / admin / editor / viewer per workspace and org✓ Active
Tenant isolationAll DB queries scope to authenticated org_id / user_id✓ Active
Rate limitingSliding window rate limits on all auth, AI, and write endpoints✓ Active
IP-based signup throttling5 accounts per IP per hour✓ Active

3. Data Protection

3.1 Encryption

3.2 Secrets Management

Production secrets (JWT_SECRET, KAIXU_GATE_TOKEN, STRIPE_SECRET_KEY, etc.) are stored exclusively in Netlify's encrypted environment variable store and Cloudflare Worker secrets. They are never committed to source control. Secrets that are compromised can be rotated without code deployment.

3.3 Token Security

AI gateway Bearer tokens are stored as SHA-256 hashes in the database — the plaintext is shown only once at creation. Compromised tokens can be revoked instantly from the admin dashboard. Tokens have configurable monthly call limits.

4. Application Security

Vulnerability ClassControl
SQL InjectionParameterised queries exclusively (pg driver); no string concatenation in SQL
Cross-Site Scripting (XSS)Content-Security-Policy header; no innerHTML with user content; output encoding
Cross-Site Request ForgeryJWT Bearer tokens (not cookies) for API auth; SameSite cookie attribute where cookies are used
ClickjackingX-Frame-Options: SAMEORIGIN; frame-ancestors CSP directive
MIME sniffingX-Content-Type-Options: nosniff on all responses
Missing auth on write endpointsrequireAuth() called at the top of every state-mutating function
Insecure dependenciesnpm audit runs on every CI push; 0 vulnerabilities as of last audit
Information disclosureError messages do not leak stack traces or internal paths in production

5. Monitoring and Incident Response

5.1 Monitoring

5.2 Incident Response

EventResponse TimeAction
Security vulnerability report24 hoursTriage, reproduce, severity assessment, patch schedule
Confirmed critical vulnerability72 hoursEmergency patch, affected customer notification
Suspected data breach72 hoursContainment, forensic analysis, regulatory notification (GDPR Art. 33), customer notification
Service outage15 minutesStatus page update, investigation, root cause analysis within 48 hours

6. Organisational Security

7. Responsible Disclosure

We welcome security researchers. If you discover a vulnerability:

We do not operate a bug bounty programme at this time, but we will acknowledge your contribution publicly if you wish.

8. Compliance Roadmap

FrameworkStatusNotes
GDPR / UK GDPR✓ CompliantDPA available, SCCs in place for transfers, 72-hr breach notification
CCPA✓ CompliantData deletion on request, no sale of personal data
SOC 2 Type IIPlannedRoadmap: formal audit within 12 months of GA launch
ISO 27001PlannedRequired for regulated-industry enterprise contracts
OWASP Top 10✓ AddressedAll OWASP Top 10 categories reviewed and mitigated

9. Contact

Security reports: security@kaixu.app (PGP key available on request)
Data protection: privacy@kaixu.app