SECURITY(7)SECURITY(7)

NAME

security - AIT Community Security & Transparency

SYNOPSIS

No need to hack us. We are transparent on purpose: clear about our stack, clear about our boundaries, and clear about how to report issues responsibly.

DESCRIPTION

WHAT WE RUN

We run a modern TypeScript web stack with Next.js on the frontend and server, Better Auth for identity flows, and Postgres with Drizzle for application data. We also rely on managed providers for email delivery, payments, and hosting operations. We publish this at a high level so members, engineers, and partners understand our direction without exposing sensitive implementation details.

HOW WE PROTECT MEMBERS

Our baseline controls focus on boring reliability: access control at the server layer, strict input validation, and authorization checks before sensitive actions. We apply rate limiting and abuse controls, keep audit and operational logs for investigation, maintain backup and recovery procedures, and patch dependencies on a regular cadence.

WHAT WE DON'T PUBLISH

Transparency does not mean publishing secrets. We do not disclose tokens, internal keys, private environment configuration, internal network topology, or exploit-specific implementation details. If you are looking for enough information to trust our posture, this page is for you. If you are looking for enough information to bypass it, this page is not for you.

FOUND SOMETHING?

If you found a vulnerability, report it responsibly and include reproducible steps, impact, and any proof-of-concept details needed for validation. Send reports to info@klevox.com. We target acknowledgement within 48 hours and will keep you updated while we investigate and remediate.

AIT CommunitySECURITY(7)
Security & Transparency - AIT Community