Enterprise-Grade Security

Your data and donations are protected by industry-leading security measures, compliance standards, and privacy controls.

RBAC
Portal-Scoped Access
Signed
Webhooks & Receipts
Private
Storage & Signed URLs

Security Architecture

Multi-layered security approach protecting every aspect of our platform

App Check Protection

All public endpoints are protected by Google App Check, preventing automated attacks and ensuring requests come from legitimate sources.

Firebase Authentication

Secure user authentication with custom claims for role-based access control (RBAC), session management, and multi-factor authentication support.

Firestore Security Rules

Granular access control at the database level, ensuring users can only access data they're authorized to see based on their roles and permissions.

Data Encryption

All data is encrypted in transit (TLS 1.3) and at rest (AES-256). Payment data is handled by PCI-compliant providers (Stripe, Paystack).

Secret Management

All API keys, database credentials, and sensitive configuration are stored in Google Cloud Secret Manager with automatic rotation and access logging.

Rate Limiting

Cloud Armor and Redis-based rate limiting protect against abuse and DDoS attacks, with automatic blocking of suspicious activity.

Payment Security

PCI-compliant payment processing with multiple secure providers

Stripe Integration

  • Signed webhook verification with Stripe signature
  • Card data handled by PCI-compliant payment providers
  • Idempotency keys for duplicate prevention
  • 3D Secure authentication for high-risk transactions

Paystack Integration

  • HMAC-SHA512 webhook signature verification
  • Provider-managed payment handling and signature verification
  • Constant-time comparison for signature validation
  • Local payment methods for Nigerian market

Data Privacy & Retention

Comprehensive privacy controls and data protection measures

Tax Document Privacy

  • Private GCS storage with V4 signed URLs
  • 15-minute TTL for secure access
  • 7-year retention for compliance
  • Automatic lifecycle management

Session Security

  • HttpOnly, Secure, SameSite cookies
  • Server-side session verification
  • Automatic session expiration
  • CSRF protection

User Rights

  • Data access and portability
  • Right to deletion (with limitations)
  • Notification preferences control
  • Quiet hours and cooldown settings

Evidence Privacy

  • Private until verification complete
  • Public only when verified=true
  • Secure upload with virus scanning
  • Access logging and audit trail

Security Control Areas

Operational controls that are implemented in the platform today

Access Control

Custom-claims RBAC, scoped portals, and server-side authorization checks for operational actions

Payment Integrity

Signed Stripe and Paystack webhooks, idempotent processing, and payout-state tracking

Data Protection

Encryption in transit, private storage buckets, signed URLs, and managed secrets

Auditability

Evidence logs, payout traces, tax-document records, and notification history across core workflows

Operational Safeguards

Rate limiting, maintenance gates, signed internal calls, and disabled public debug surfaces

Retention & Access Windows

Document retention policies, signed-download expirations, and lifecycle-managed storage paths

Security Incident Response

Coordinated incident handling and private responsible disclosure

Our Response Process

1
Detection
Automated monitoring and alerting
2
Assessment
Impact analysis and containment
3
Notification
Affected users informed within 24h
4
Recovery
System restoration and monitoring

Responsible Disclosure

Ebun does not currently operate a public bug bounty or paid vulnerability rewards program. If you identify a credible security issue, report it privately so our team can triage and remediate it responsibly.

Use the contact page or email tech@ebun.io with clear reproduction steps
Do not access user data, run destructive tests, or disrupt platform availability
We acknowledge credible reports and prioritize response by impact and exploitability

Need to Report a Security Issue?

Use the technical support channel for vulnerability reports, suspicious activity, or questions about platform safeguards