Security

Security posture

This page describes the controls ForoCivic currently uses. It is an honest current-state summary, not a certification statement.

Last reviewed March 2026

Primary stack

Next.js, Supabase, and server actions

Authentication, data access, and writes are currently handled through the application server and managed Postgres.

Access control

Role-based and organization-scoped

Admins, moderators, residents, and organization members are separated by app logic and database policies.

Operational posture

Current-state disclosure only

No SOC 2, independent penetration test, or formal certification is claimed on this page.

ForoCivic uses HTTPS for web access and relies on managed infrastructure for hosting and storage. Confirm your exact Supabase project settings, deployment provider settings, and data-retention configuration before public launch.

What is currently in place

Authentication is handled through the application and the Supabase auth stack. Access-sensitive mutations run on the server, not only in the browser.

Organization data is scoped by tenant boundaries. Community orgs, membership, invites, verification requests, and issue participation are separated by role and organization context.

Resident verification, join requests, and moderation actions all use backend enforcement paths. Users cannot become verified or gain access by changing only the client UI.

  • Server-side authorization for protected actions
  • Row-level security for org-scoped tables
  • Role-based UI gating for admin and moderator surfaces
  • Rate limiting and input validation on sensitive actions where currently implemented

What we do not claim

This repository does not claim formal compliance certification, independent audit status, or a universal legal guarantee of security.

If a municipality requires a specific security questionnaire, hosted deployment review, or third-party assessment, that process still needs to be completed separately.

Any external data provider, email provider, or hosting platform has its own operational settings that must be reviewed by the operator before launch.

Operational safeguards

High-risk routes are protected with server-side access checks. Admin-only analysis, settings, resident review, and moderation surfaces are not intended for citizen access.

The application distinguishes between public marketing pages and authenticated workspace surfaces. Sensitive pages are not exposed as anonymous write endpoints.

Sensitive user data such as address and resident verification material is kept in private workflows rather than in general public profile surfaces.

Responsible disclosure

If you believe you have found a security vulnerability, report it to support@forocivic.com with a clear description and reproduction steps.

We will review reports promptly and work with municipalities or affected parties as appropriate.

Contact and review

If you are evaluating ForoCivic for a pilot or procurement review, request the current security questionnaire and deployment summary from the team before signing.