How we protect
your race data.
A plain-English summary of the security behind bibly.run — what we protect, how we protect it, and how we keep it that way over time.
Six layers, one promise.
How we stay clean over time.
Security gets quietly worse as code changes and new features ship. To prevent drift, Bibly is audited on an automated, recurring schedule:
| Cadence | What's checked | Outcome |
|---|---|---|
| Weekly | Live response headers, TLS, database access rules, recent code changes, secret scan | Quiet pass, or alert to founder |
| Monthly | Full audit — every database table, all user roles tested for cross-account access, dependency vulnerabilities, repository review | Scored report with action items |
| Quarterly | Threat-model review, new attack-surface analysis, compliance posture | Plan adjustments |
| Ad-hoc | Triggered by major changes (new payment method, new integration, vendor disclosure) | Targeted deep dive |
Each audit produces a versioned report. Findings are triaged by severity and tracked to closure.
What we've published.
We publish a public summary of our security posture every quarter. Detailed findings remain internal, but the headline numbers and remediation status are open.
Next public report: August 2026.
Found something? Tell us.
If you believe you've found a security issue affecting Bibly, we want to hear about it. Please email security@bibly.run with a description of the issue and steps to reproduce. We aim to acknowledge reports within 48 hours and resolve confirmed issues promptly. We do not pursue legal action against researchers acting in good faith within the scope described on this page.