<- Back to Home

Security at Xandhi OS

Security is foundational to everything we build. This page provides transparency into how we protect your data, code, and accounts.

Infrastructure Security

SSL/TLS Encryption

All data in transit is encrypted using TLS 1.3. HSTS headers enforce HTTPS connections.

Firewall (UFW)

Only ports 22 (SSH), 80 (HTTP), and 443 (HTTPS) are open. All other ports are blocked.

Fail2ban Protection

Automated intrusion detection. SSH brute-force attempts result in 2-hour IP bans after 3 failed attempts.

DDoS Mitigation

Nginx rate limiting: 30 requests/minute for APIs, 5 requests/minute for authentication endpoints.

Server Location

Hosted on Hetzner Online GmbH in Falkenstein, Germany. ISO 27001 certified data center.

Auto-updates

Ubuntu Pro with Extended Security Maintenance. Automatic security patches via unattended-upgrades.

Application Security

Authentication

JWT token-based auth with automatic expiry checks every 60 seconds. Tokens are stored client-side only.

Password Security

Minimum 8 characters. Bcrypt hashing with salt. Account lockout after 5 failed login attempts (15-minute cooldown).

Input Sanitization

All user prompts are sanitized to prevent XSS, script injection, and command injection attacks.

CORS Policy

API access restricted to xandhi.com origin only. Cross-origin requests from unauthorized domains are blocked.

Payment Security

Payments processed by Razorpay (PCI DSS Level 1). We never store card numbers, CVVs, or banking credentials.

Data Encryption

Database credentials encrypted. .env files restricted to root-only access (chmod 600). Secrets never exposed in client code.

Data Handling

Your prompts are sent to AI providers (via OpenRouter) for code generation. We do not use your prompts to train AI models. Generated code belongs to you. Build data is stored in PostgreSQL with encrypted connections. Redis is used for session caching with automatic expiry. Database backups run daily at 3 AM UTC.

Bug Bounty and Responsible Disclosure

If you discover a security vulnerability, please report it responsibly to security@xandhi.com. We offer recognition and may offer bounties for critical vulnerabilities. We commit to acknowledging reports within 24 hours and providing resolution timelines within 72 hours. We do not pursue legal action against good-faith security researchers.

Our Stack, Honestly

Self-hosted on Hetzner Cloud (Falkenstein, Germany). TLS 1.3 on every endpoint. Automated daily database backups. Per-route rate limiting at the nginx layer. JWT-based authentication. Encrypted secrets at rest, root-only .env files. No card data ever touches our servers — all payments are tokenized through Razorpay.

Compliance

Information Technology Act, 2000 (India) compliant. GDPR-aware data handling practices. Working toward SOC 2 Type I readiness in the medium term. We do not currently hold SOC 2, ISO 27001, or PCI DSS certifications — the PCI DSS Level 1 status of Razorpay applies to their payment processing, not to us directly. We will update this page as our compliance posture evolves.