Security Testing Methodology
Our application currently undergoes standard manual QA testing by our internal team, which includes a structured security checklist focused on common vulnerabilities such as broken authentication, input validation (XSS, SQL injection), session management, access control, and secure error handling.
In addition to this, we use Cloudflare to enforce HTTPS, protect against DDoS attacks, apply rate limiting, and enable web application firewall (WAF) rules — all of which help mitigate a wide range of external threats.
At this stage, we have not yet implemented formal automated security testing or third-party audits. However, we are in the process of evaluating tools like Snyk (for dependency scanning) and OWASP ZAP (for basic vulnerability scanning) for integration into our CI/CD pipeline. These will allow us to automatically identify vulnerabilities on each deployment.
As we scale, we plan to engage a third-party security firm for deeper assessments, including penetration testing and secure code reviews. Security is a growing priority for us, and we are committed to maturing our processes as our product and customer base grow.