Security at G6 Solver
Last Updated: 12 August 2025
1. Data Protection
Data at Rest
- All stored data is encrypted using Django’s Fernet-based Base64 encryption with secure key management.
- The desktop application encrypts all user data locally; this data is never transmitted to our servers unless required for specific user actions (e.g., bug reports).
Data in Transit
- All communications between clients, servers, and third-party integrations occur over HTTPS/TLS to prevent interception or tampering.
2. Authentication & Access Control
- User authentication requires a username and password.
- All passwords are hashed and salted before storage; plaintext passwords are never stored.
- Single-device licence enforcement is applied to the desktop application via a proprietary hashing function, preventing execution on unregistered devices.
- MFA and token-based logins are not currently implemented due to the assumption that application access implies device-level authentication.
3. Infrastructure Security
Our server infrastructure is hosted on Amazon Web Services (AWS) with strong physical and network-level security.
Cloudflare is used for DDoS mitigation, firewalling, and traffic filtering.
Network security measures include:
- Firewalls
- Intrusion detection and prevention systems
- Automated rate limiting for abusive traffic patterns
4. Application Security
Secure coding practices include:
- Input validation and sanitisation
- Prevention of SQL injection
- Strict separation of code and data layers
We conduct:
- Regular code audits
- Vulnerability scanning
- Penetration testing
Note: Due to the self-rewriting nature of the G6 Solver system, while we maintain strong safeguards, we cannot absolutely guarantee stability against every malicious attack vector.
5. Incident Response
- We maintain internal protocols for detecting, logging, and investigating security incidents.
- We aim to acknowledge and begin addressing reported vulnerabilities within 24 hours.
- Security updates and patches are deployed as soon as practical after validation.
6. User Responsibilities
Users are responsible for securing their devices, operating systems, and login credentials.
We recommend:
- Using strong, unique passwords.
- Keeping your system and software up to date.
- Avoiding use on unsecured or shared devices.
7. Responsible Disclosure
We welcome responsible disclosure of security vulnerabilities. If you discover a vulnerability, please email [email protected].
- Do not exploit the vulnerability or access other users’ data.
- Do not publicly disclose the vulnerability until we have confirmed and patched it.
- Bug bounty rewards may be payable at our absolute discretion upon confirmation of the vulnerability.
8. Third-Party Services
Some G6 Solver features rely on external large language model (LLM) backend providers, such as OpenRouter.
- We act as infrastructure on top of these LLMs and do not control their internal security or data handling.
- You should review the security and privacy policies of these providers before use.
- Data sent to third-party LLM providers is subject to their processing and storage policies.
9. Contact
For security-related concerns, please contact: [email protected]