Security is not an afterthought at Stelo | it is part of the architecture from day one. This page describes the measures we take to protect your data and the accounts you trust us with.
All user data is stored on infrastructure operated by Supabase, Inc. Supabase is SOC 2 Type II certified and maintains industry-standard security controls. Data is hosted in data centres that comply with ISO 27001.
Passwords are never stored in plaintext. We store a cryptographic hash of your password. We are actively working on migrating account authentication to Supabase Auth for improved security.
User sessions are managed with short-lived JWT tokens. Sessions expire after 7 days of inactivity and can be revoked from any device via Settings. We plan to add two-factor authentication (2FA) in a future release.
All data submitted to the Stelo API is validated and sanitised server-side to prevent injection attacks. We follow the OWASP Top 10 guidelines in our development practices.
API endpoints are rate-limited to prevent brute-force and denial-of-service attacks. Repeated failed login attempts trigger a temporary account lockout.
We regularly audit our third-party dependencies for known vulnerabilities using automated tooling. Critical security patches are applied within 24 hours of public disclosure.
Stelo+ subscriptions are handled entirely by RevenueCat (subscription management) and Stripe (payment processing). Stripe is certified to PCI Service Provider Level 1 | the most stringent level of payment card industry certification.
Stelo never receives, processes, or stores raw payment card data. We only receive a subscription status (active/inactive) and renewal dates from RevenueCat.
Friend connections in Stelo are mutual and require both parties to confirm. By default, only your username, current streak, and level are visible to friends. You can further restrict what is shared in Settings. We never expose your email address or other account details to other users.
In the event of a confirmed security breach affecting user data, we will:
If you have discovered a security vulnerability in Stelo, we want to know about it as soon as possible. We ask that you:
We do not take legal action against good-faith security researchers who follow these guidelines.