Back to home

Security

Last updated: December 18, 2025

At CodePanion, security is foundational to everything we build. We understand that you're trusting us with sensitive assessment data and candidate information. This page outlines our security practices and commitments.

Our Security Commitment

We take the security of your data seriously. CodePanion is built on enterprise-grade infrastructure with security measures designed to protect your information at every level.

Our security approach follows industry best practices and is continuously reviewed and improved to address emerging threats.

Infrastructure Security

CodePanion is built on Firebase, which runs on Google Cloud Platform (GCP) infrastructure. This provides us with world-class security capabilities:

Google Cloud Platform

  • SOC 2 Type II Compliant: Independently audited security controls
  • ISO 27001 Certified: International information security standard
  • Physical Security: Data centers with 24/7 security, biometric access, and video surveillance
  • Geographic Redundancy: Data replicated across multiple availability zones

Network Security

  • DDoS protection and mitigation
  • Web Application Firewall (WAF)
  • Intrusion detection systems
  • Regular security scanning and penetration testing

Data Protection

Encryption in Transit

All data transmitted between your browser and our servers is encrypted using TLS 1.3, the latest version of Transport Layer Security. We enforce HTTPS on all connections.

Encryption at Rest

All data stored in our databases is encrypted using AES-256 encryption. This includes:

  • User account information
  • Assessment data and submissions
  • Company and candidate records
  • Badge and certification data

Database Security Rules

We use Firebase Firestore with comprehensive security rules that enforce:

  • User authentication requirements for all data access
  • Role-based access control (companies, candidates, admins)
  • Data validation to prevent malformed inputs
  • User data isolation - users can only access their own data

Authentication Security

We use Firebase Authentication to provide secure, industry-standard authentication:

  • Secure Password Hashing: Passwords are hashed using bcrypt with appropriate work factors
  • Session Management: Secure, httpOnly cookies with appropriate expiration
  • Token-Based Auth: JWT tokens with short expiration times
  • Rate Limiting: Protection against brute force attacks

Admin Access

Administrative access to the platform is strictly controlled:

  • Limited to designated admin accounts
  • All admin actions are logged
  • Regular review of admin access

Application Security

Secure Development Practices

  • Server-Side Secrets: Sensitive credentials (like Slack webhooks) are stored server-side only and never exposed to browsers
  • Input Validation: All user inputs are validated and sanitized
  • HTTPS Enforcement: All traffic is encrypted
  • Security Headers: Implementation of security headers (CSP, X-Frame-Options, etc.)
  • Dependency Management: Regular updates and security audits of dependencies

OWASP Top 10 Protection

We actively protect against the OWASP Top 10 security risks, including:

  • SQL Injection (we use NoSQL with parameterized queries)
  • Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Broken Authentication
  • Security Misconfiguration

Access Controls

We implement the principle of least privilege throughout our system:

User Roles

  • Companies: Can create assessments, view candidates, manage team members
  • Candidates: Can take assessments, view their own results and badges
  • Admins: Platform administration with full audit logging

Data Isolation

Each company's data is logically isolated. Companies can only access their own assessments, candidates, and results. Candidates can only access their own submissions and badges.

Incident Response

Monitoring and Alerting

We continuously monitor our systems for security events:

  • Real-time logging of security-relevant events
  • Automated alerting for suspicious activity
  • Regular review of security logs

Incident Response Procedure

In the event of a security incident, we follow a structured response process:

  • Detection: Identify and assess the scope of the incident
  • Containment: Limit the impact and prevent further damage
  • Eradication: Remove the threat and restore systems
  • Recovery: Return to normal operations
  • Post-Incident Review: Learn and improve from the incident

Breach Notification

In the event of a data breach that affects your information, we will notify affected users within 72 hours in accordance with applicable regulations.

Responsible Disclosure

We welcome reports from security researchers who discover vulnerabilities in our platform. If you discover a security issue, please report it to us responsibly:

  • Email: hello@codepanion.dev (subject: Security Vulnerability)
  • Include detailed steps to reproduce the vulnerability
  • Allow us reasonable time to address the issue before public disclosure
  • Do not access or modify data belonging to other users

We commit to acknowledging receipt of your report within 48 hours and will work with you to understand and address the issue promptly.

Compliance and Updates

GDPR Compliance

We are committed to GDPR compliance for users in the European Union:

  • Lawful basis for data processing
  • Data minimization principles
  • User rights to access, correction, and deletion
  • Data processing agreements with third parties

Security Updates

We maintain a regular schedule of security updates:

  • Regular dependency updates and security patches
  • Continuous monitoring of security advisories
  • Prompt remediation of identified vulnerabilities

Questions About Security?

If you have questions about our security practices or would like more information, please contact us at hello@codepanion.dev