Security Documentation

Effective: February 7, 2026 | Last updated: 2/20/2026

1. Data Encryption

  • TLS 1.3 for all data in transit.
  • AES-256 for data at rest.
  • End-to-end protection for uploaded photos across the processing flow.

2. Authentication & Access Control

  • Clerk-based authentication for secure sign-in and session handling.
  • Role-based access control for scoped user permissions.
  • Session management with expiration controls and session abuse protections.
  • Optional multi-factor authentication (MFA) for stronger account security.

3. Infrastructure Security

  • Hosted on Vercel (SOC 2) for hardened and scalable delivery.
  • File storage on Cloudflare R2.
  • Database and backend operations on Convex.
  • DDoS protection and edge security controls via Cloudflare.

4. Evidence Integrity

  • SHA-256 hashing for evidence integrity verification.
  • Extraction of relevant EXIF metadata (where available) for traceability.
  • Audit and integrity metadata for data origin and handling steps (e.g., upload and processing timestamps).
  • Tamper-evident integrity controls (e.g., hash verification) to identify post-capture modifications.

For full technical and process prerequisites, see our Evidence Requirements.

5. Application Security

  • Rate limiting to mitigate abusive traffic patterns.
  • Input validation to reduce unsafe data handling.
  • CSRF protections for state-changing operations.
  • Content Security Policy (CSP) headers to reduce injection risk.
  • Regular dependency scanning for known vulnerabilities.

6. Incident Response

  • Continuous monitoring with operational alert procedures.
  • Defined escalation and response workflows for security incidents.
  • Notification of affected parties and authorities within 72 hours under GDPR where required.
  • Security incidents can be reported to security@faultrix.com.

7. Compliance

  • Data protection alignment with GDPR (EU) and DSG (Austria).
  • Report and process alignment with relevant OeNORM standards.
  • Security and privacy controls are reviewed and updated regularly.

8. Vulnerability Disclosure

  • Faultrix follows a responsible disclosure policy for reported vulnerabilities.
  • Security researchers are asked to provide reproducible details and report responsibly.
  • Contact for vulnerability reports: security@faultrix.com