Security
Financial execution requires uncompromising security. Here's what we do to protect your account, wallet, and transactions — and how to report vulnerabilities.
Passwords and transaction PINs are hashed with bcrypt (work factor 12) before storage. We never store plaintext credentials.
Sensitive fields (passwords, PINs) are AES-256-GCM encrypted by the client before leaving the browser. The server decrypts using a shared key that never appears in client code.
All communication between your browser and our servers uses TLS 1.2 or higher. HTTP requests are permanently redirected to HTTPS.
Session tokens are stored in HttpOnly, Secure, SameSite=Strict cookies — inaccessible to JavaScript and protected against CSRF and XSS token theft.
After 5 incorrect PIN attempts, your transaction PIN is locked. You must contact support to unlock, preventing brute-force attacks on financial operations.
Admin and operations portals are fully isolated from user sessions at the middleware layer. Users cannot access or even discover admin routes.
We welcome good-faith security research. If you discover a vulnerability in the Raiz Auto platform, please report it to us privately before public disclosure. We commit to:
Email your findings to our security team. Encrypt your report with our PGP key if the details are sensitive.
security@raizauto.comSafe harbour
Research conducted in good faith under this policy will not be subject to civil or criminal action from Raiz Auto. You must not access, modify, or delete data belonging to other users, and must minimise impact during testing.
We take every report seriously. Please don't publicly disclose the issue until we've had a chance to address it.
Report a vulnerability