This document describes Report Shield's security controls, vulnerability disclosure process, incident response procedures, breach notification policy, and response time commitments. It is published publicly to support agency security review processes and to establish accountability to our users.
FOR SECURITY RESEARCHERS: If you have discovered a potential vulnerability in Report Shield, please report it directly to security@reportshield.app before public disclosure. We commit to acknowledging your report within 24 hours and providing a remediation timeline within 72 hours.
The following controls are currently active in the Report Shield platform. This list is maintained for agency IT and security reviewers.
| Control | Status | Details |
|---|---|---|
| Multi-Factor Authentication | Active | TOTP MFA mandatory for all accounts. Maximum 1 factor per account enforced at provider level. |
| MFA Brute-Force Protection | Active | 5 consecutive failed MFA attempts triggers immediate session termination. Applied at application layer in addition to platform rate limiting. |
| Password Reset Hardening | Active | hCaptcha on reset form. Rate limited to 3 requests per 15 minutes. Constant-time response prevents email enumeration. Password reset suspends account and clears all MFA factors pending admin re-approval. |
| Session Security | Active | Sessions stored in browser session storage only. Browser close clears session. 60-minute inactivity timeout. Sessions do not persist across browser restarts. |
| Zero Report Retention | Active | Report text is never written to any database or log by Report Shield. Anthropic API logs retained maximum 7 days per commercial API terms. ZDR agreement with Anthropic in progress. |
| Transport Security | Active | HTTPS enforced on all endpoints. HTTP Strict Transport Security (HSTS) with 2-year max-age and preload enabled via Vercel. |
| Content Security Policy | Active | CSP, X-Frame-Options (DENY), X-Content-Type-Options (nosniff), Referrer-Policy (no-referrer), Permissions-Policy enforced at server level. |
| Bot Protection | Active | hCaptcha on all authentication and password reset endpoints. |
| Database Row Level Security | Active | Supabase RLS policies enforced. Users can only read their own profile data. Admin operations require service role key. |
| Browser Cache Prevention | Active | Report input fields configured with autocomplete=off, spellcheck=false, autocorrect=off to prevent browser and extension caching of report content. |
| Officer Verification | Active | PTB certification number required at signup. Department email accounts auto-approved. Personal email accounts require manual PTB verification against the Illinois Professional Training Board. |
| CJIS Certification | Pending | CJIS Security Policy compliance certification is in progress. NCIC, LEADS, and criminal history data must not be submitted to the platform pending certification. |
| Third-Party Security Audit | Planned | SOC 2 Type I audit is planned. No third-party attestation has been completed at this time. |
| Anthropic Zero Data Retention | In Progress | ZDR agreement with Anthropic is being executed. Until complete, standard commercial API terms apply with 7-day log retention. |
Report Shield welcomes reports of potential security vulnerabilities from security researchers, agency IT personnel, and users. We are committed to working with reporters in good faith and resolving valid issues promptly.
To report a vulnerability:
What to expect after reporting:
OUT OF SCOPE: Social engineering attacks against Report Shield staff or users, physical security attacks, denial of service, and spam or phishing campaigns are outside the scope of this program and will not be treated as valid reports.
Security incidents are classified by severity to determine response priority and notification requirements.
| Severity | Definition | Examples |
|---|---|---|
| CRITICAL | Unauthorized access to user data or report content, active exploitation of a vulnerability, account takeover at scale | Database breach, MFA bypass in production, unauthorized admin access |
| HIGH | Vulnerability that could lead to unauthorized access if exploited, single account compromise | Authentication flaw, privilege escalation, session hijacking |
| MEDIUM | Security control failure without confirmed data exposure, anomalous access patterns | Rate limit bypass, CSP violation, unexpected admin access attempt |
| LOW | Minor security issues, informational findings, configuration weaknesses without exploitability | Missing security header, outdated dependency without known exploit |
The following response time commitments apply to confirmed security incidents from the time of detection or verified report.
The following steps are taken upon detection or report of a confirmed security incident:
In the event of a confirmed data breach involving user account information or report content, Report Shield will take the following notification actions:
IMPORTANT — CJIS DATA: Report Shield's CJIS certification is pending. Officers must not submit NCIC, LEADS, or criminal justice database data through this platform. In the event of a breach, Report Shield cannot be responsible for unauthorized CJIS data submitted in violation of platform restrictions.
Report Shield relies on the following third-party providers for core security functions. Their security posture directly affects Report Shield's security baseline.
| Provider | Function | Security Commitment |
|---|---|---|
| Supabase | Authentication & database | SOC 2 Type II certified. HIPAA compliant. Platform-level rate limiting and MFA enforcement. |
| Anthropic | AI report analysis | Commercial API terms prohibit training on customer data. 7-day log retention. ZDR agreement in progress. |
| Vercel | Hosting & delivery | SOC 2 Type II certified. HTTPS enforcement and security header delivery. |
| Stripe | Payment processing | PCI DSS Level 1 certified. Card data never touches Report Shield infrastructure. |
| hCaptcha | Bot protection | GDPR compliant. Applied to all authentication and password reset endpoints. |
Security issues, vulnerability reports, and breach notifications should be directed to:
For vulnerability reports and security inquiries:
security@reportshield.appFor general support: support@reportshield.app
Agency security reviewers may request additional technical documentation. We respond to documented requests within 5 business days.
COMMITMENT: Report Shield is committed to continuous improvement of its security posture. This page will be updated as new controls are implemented, certifications are achieved, and the platform evolves. The last-updated date at the top of this page reflects when this document was last materially revised.