Security at Sergio

How we protect your business and customer data

Did someone tell you to open this?

If someone directed you to the browser console (Developer Tools) and asked you to paste code, STOP immediately. This is a common attack called Self-XSS (Cross-Site Scripting).

What attackers want:

  • - Steal your login session and impersonate you
  • - Access your customer data and business information
  • - Make unauthorized changes to your account
  • - Steal payment information or redirect funds

Remember: Sergio employees will never ask you to paste code into the console. If you encounter this, report it to [email protected].

Social Engineering Attacks

Social engineering is when attackers manipulate people into giving up confidential information or taking actions that compromise security. These attacks target you, not our systems.

Self-XSS

Attackers convince you to paste malicious code into the browser console, promising "free features" or "account hacks." This code steals your session.

Phishing

Fake emails or websites that look like Sergio, asking for your password. Always check the URL - we're only at sergio.app.

Pretexting

Someone pretending to be from "Sergio Support" asking for your credentials. We will never ask for your password.

Baiting

Offers that seem too good to be true - "free premium features" or "unlimited storage." These typically require compromising your account.

How to Protect Yourself

  • Never paste code into the browser console unless you wrote it yourself
  • Verify URLs before entering credentials - look for sergio.app
  • Enable two-factor authentication on your account
  • Report suspicious emails to [email protected]

Multi-Tenant Data Isolation

Sergio is a multi-tenant platform - multiple businesses share the same infrastructure. But your data is completely isolated from other companies through multiple security layers.

Row-Level Security (RLS)

Every database query is automatically filtered by your company ID at the database level. This isn't application code that could have bugs - it's enforced by PostgreSQL itself.

-- Example RLS policy on jobs table CREATE POLICY "Users can only see their company's jobs" ON jobs FOR SELECT USING (company_id = auth.jwt() ->> 'company_id');

Even if an attacker gained access to the database, they could only see their own company's data.

Subdomain Isolation

Each company operates on their own subdomain (e.g., yourcompany.sergio.app). This provides browser-level cookie isolation and makes phishing attempts more obvious.

JWT Token Binding

Authentication tokens are cryptographically bound to your company ID. A token from one company cannot access another company's resources - the signature verification will fail.

Authentication & Access Control

Password Security

  • Passwords hashed with bcrypt (work factor 12)
  • Minimum 8 characters required
  • Checked against known breached password lists
  • We never store or log plaintext passwords

Session Security

  • Sessions expire after 7 days of inactivity
  • Tokens automatically refresh without user action
  • Ability to remotely terminate all sessions
  • Login attempts are rate-limited

Role-Based Access Control

Access is restricted based on your role within the organization:

Admin

Full access to all features, billing, and team management

Manager

Manage jobs, customers, and team schedules

Technician

View and complete assigned jobs only

Encryption & Data Protection

In Transit

All connections use TLS 1.3 encryption. HSTS headers force HTTPS on all requests. Certificate pinning is enforced on mobile apps.

At Rest

Database storage is encrypted with AES-256. Backups are encrypted and stored in geographically separate locations.

Payment Data

We never store credit card numbers. Payment processing is handled by Stripe, a PCI DSS Level 1 certified processor. We only store transaction IDs for reference.

Infrastructure Security

Hosting

  • - Database hosted on Supabase (Canadian data centers)
  • - Edge functions on Cloudflare Workers (global)
  • - Static assets on Cloudflare CDN
  • - SOC 2 Type II certified infrastructure

Protection

  • - DDoS protection via Cloudflare
  • - Web Application Firewall (WAF)
  • - Automated security scanning
  • - 24/7 monitoring and alerting

Related Resources

Report a Security Issue

Found a vulnerability? We appreciate responsible disclosure. Contact our security team directly.

[email protected]