Company
Last updated: April 3, 2026
Security is core to what MindFrame does. You share cognitive data with us โ data that reveals how you think. We take the responsibility to protect it seriously. This page describes our security posture and how to report vulnerabilities.
Authentication
Supabase Auth โ JWT tokens with short expiry. Refresh tokens stored in httpOnly cookies. Passwords hashed with bcrypt (never stored in plaintext).
Encryption in transit
All communication over TLS 1.2 or higher. Forced HTTPS โ no plaintext HTTP endpoints.
Database
PostgreSQL on Supabase with row-level security policies. Encrypted at rest (AES-256). Production DB accessible only from the API service.
Caching
Redis (Upstash) for response caching. No PII stored in cache. TLS-encrypted connection.
Hosting
API on Railway; web on Vercel with edge CDN. Automated deploys from main branch with no manual server access required.
Transactional email via Resend. Email content is not cached or stored beyond delivery logs (30 days).
We appreciate security researchers who help keep MindFrame safe. If you've discovered a vulnerability, please report it responsibly:
Email: security@usemindframe.com
Response time: Initial acknowledgement within 24 hours; full investigation within 72 hours
Language: English preferred
Please include: a description of the vulnerability, steps to reproduce, potential impact, and any proof-of-concept (without causing harm). We will credit researchers who report valid vulnerabilities (if desired).
In scope:
Out of scope:
As MindFrame grows, we are committed to: