NAME
security - AIT Community Security & Transparency
SYNOPSIS
No need to hack us. We are transparent on purpose: clear about our stack, clear about our boundaries, and clear about how to report issues responsibly.
DESCRIPTION
TABLE OF CONTENTS
WHAT WE RUN
We run a modern TypeScript web stack with Next.js on the frontend and server, Better Auth for identity flows, and Postgres with Drizzle for application data. We also rely on managed providers for email delivery, payments, and hosting operations. We publish this at a high level so members, engineers, and partners understand our direction without exposing sensitive implementation details.
HOW WE PROTECT MEMBERS
Our baseline controls focus on boring reliability: access control at the server layer, strict input validation, and authorization checks before sensitive actions. We apply rate limiting and abuse controls, keep audit and operational logs for investigation, maintain backup and recovery procedures, and patch dependencies on a regular cadence.
WHAT WE DON'T PUBLISH
Transparency does not mean publishing secrets. We do not disclose tokens, internal keys, private environment configuration, internal network topology, or exploit-specific implementation details. If you are looking for enough information to trust our posture, this page is for you. If you are looking for enough information to bypass it, this page is not for you.
FOUND SOMETHING?
If you found a vulnerability, report it responsibly and include reproducible steps, impact, and any proof-of-concept details needed for validation. Send reports to info@klevox.com. We target acknowledgement within 48 hours and will keep you updated while we investigate and remediate.
TRUST LINKS
For legal and data-processing details, review our Privacy Policy and Terms of Service. Please do not run destructive tests, denial-of-service attempts, or social engineering campaigns against members, moderators, or infrastructure.