Security & Responsible Disclosure
Psychpedia is committed to keeping our platform and your data secure. We welcome responsible disclosure from the security community.
Last updated: April 18, 2026
Security Program Overview
Psychpedia Establishment (Commercial Registration: 7053485384, Kingdom of Saudi Arabia) operates a continuous security program aligned with NCA (National Cybersecurity Authority) Essential Cybersecurity Controls and international best practices including the OWASP Top 10 and ISO 27001 principles.
Our security posture is built on three pillars: preventive controls (secure-by-default configuration, input validation, role-based access control), detective controls (real-time monitoring, anomaly detection, dependency scanning), and responsive controls (defined incident-response procedures, timely patching, breach notification obligations under the Saudi PDPL).
TLS Version
1.2 minimum (1.3 preferred)
HSTS
2-year max-age + preload
Hosting
Vercel Edge Network
Responsible Disclosure Policy
We follow a coordinated vulnerability disclosure model. If you discover a potential security vulnerability in Psychpedia, please disclose it to us privately before making any public disclosure. We commit to working with you in good faith to understand, verify, and remediate the issue promptly.
We ask that you:
- Report findings to security@psychpedia.com before any public disclosure.
- Give us reasonable time to respond and remediate before disclosing publicly.
- Avoid accessing, modifying, or deleting user data beyond what is necessary to demonstrate the vulnerability.
- Avoid automated scanning at a scale that could degrade service availability.
- Not exploit a vulnerability beyond the minimum necessary to confirm its existence.
Scope
In Scope
- psychpedia.com and all subdomains (e.g., support.psychpedia.com)
- Psychpedia web application (authentication, question bank, dashboard, API endpoints)
- Psychpedia mobile applications (iOS / Android, where applicable)
- Psychpedia public APIs
Out of Scope
- Third-party infrastructure (Vercel, Neon, Moyasar, Resend) — report those directly to the respective vendors.
- Social engineering attacks targeting Psychpedia employees or users.
- Physical security attacks.
- Denial of service (DoS / DDoS) attacks.
- Spam, phishing, or non-security bug reports.
- Vulnerabilities requiring unlikely, highly privileged user interaction.
High-Value Finding Categories
- Authentication bypass or privilege escalation
- Unauthorized access to user data (IDOR, broken access control)
- Remote code execution (RCE)
- SQL injection or other injection vulnerabilities
- Cross-site scripting (XSS) with meaningful impact
- Significant security misconfigurations exposing production data
Reporting Process
To report a security vulnerability, email security@psychpedia.com with the following details:
- Description: A clear description of the vulnerability and its potential impact.
- Reproduction steps: Step-by-step instructions to reproduce the issue.
- Affected component: URL, endpoint, or feature where the vulnerability exists.
- Evidence: Screenshots, HTTP request/response captures, or a proof-of-concept — avoid sharing actual user data.
- Suggested severity: Your assessment (Critical / High / Medium / Low / Informational).
- Your contact details: So we can follow up with you.
Security Contact
Email: security@psychpedia.com
For non-security inquiries: support@psychpedia.com or the Contact Form.
Response SLA
We are committed to the following response timelines for valid security reports:
| Milestone | Target |
|---|---|
| Initial acknowledgement | Within 72 hours |
| Severity assessment & triage | Within 7 days |
| Status update to reporter | Every 7 days (while active) |
| Critical / High resolution | 30 days (best effort) |
| Medium / Low resolution | 90 days (best effort) |
| Coordinated public disclosure | After fix is deployed |
Timelines are best-effort targets and may vary based on issue complexity. We will communicate any delays proactively.
Safe Harbor Statement
Psychpedia will not pursue legal action against security researchers who discover and report vulnerabilities in good faith in accordance with this policy. We consider good-faith research to include:
- Acting in accordance with all guidelines set out in this disclosure policy.
- Not accessing, modifying, or exfiltrating user data beyond what is strictly necessary to demonstrate the vulnerability.
- Not performing actions that could degrade platform availability (DoS).
- Reporting findings promptly and not exploiting them for personal gain.
- Not disclosing vulnerability details publicly before we have had a reasonable opportunity to remediate.
This safe harbor applies only to security research conducted in accordance with this policy and does not extend to malicious actors, unauthorized access for personal gain, or conduct that violates applicable law beyond the minimum necessary for research purposes.
Payment Card Data
Psychpedia does not store, process, or transmit cardholder data on its own systems. All payment card transactions are handled exclusively by Moyasar, our PCI-compliant payment processor. Psychpedia receives only non-sensitive payment metadata (subscription status, last-four digits, card brand, billing address) necessary for subscription management.
In scope for this policy: Any vulnerability affecting Psychpedia's subscription management UI or API endpoints that handle payment metadata.
Infrastructure & Monitoring
Our production environment is designed with defence-in-depth principles:
Hosting
Vercel Edge Network with global CDN, automatic DDoS mitigation, and zero-downtime deployments.
Transport Security
TLS 1.2+ enforced on all endpoints. HSTS with a 2-year max-age, includeSubDomains, and preload.
Database
Neon serverless PostgreSQL with encrypted connections, automated backups, and point-in-time recovery.
Authentication
NextAuth.js with JWT sessions, bcrypt password hashing, and role-based access control (RBAC).
Dependency Scanning
Automated dependency audits on every pull request. Critical CVEs are patched on a priority basis.
Log Monitoring
Application errors and anomalies captured via Sentry with real-time alerting. Access logs retained for security review.
Patching Cycle
Security patches applied within 7 days of disclosure for critical severity; within 30 days for high severity.
Security Headers
HSTS, X-Content-Type-Options, X-Frame-Options, Referrer-Policy, Permissions-Policy, and Cross-Origin policies applied globally.
Acknowledgments
We thank all security researchers who responsibly disclose vulnerabilities to us. With your permission, we will publicly acknowledge your contribution on this page after the issue has been resolved and a coordinated disclosure period has passed.
No acknowledgments to display yet — be the first responsible reporter.
Security Contact
Psychpedia Establishment
Commercial Registration: 7053485384 — Kingdom of Saudi Arabia
Security: security@psychpedia.com
General support: support@psychpedia.com
Machine-readable disclosure: /.well-known/security.txt