TLS + secure cookies
All production environments enforce HTTPS, `COOKIE_SECURE`, and strict environment validation so tokens never travel in plain text.
Security & trust
Dokodo uses secure cookies, CSRF protection, CSP, audit logging, brute-force protection, and optional TOTP two-factor authentication. These are the controls in place today.
Private by default | No card required | Shared editing on Team
Current posture
TOTP is available
Audit retention
90 days for sensitive events
Rate limiting
Redis-backed and persistent
TOTP is available, audit logs retain 90 days of sensitive events, and brute-force protection persists through Redis-backed rate limiting.
Platform safeguards
These are current controls, not promises. They are documented in the security model and production checklist that gate the platform today.
All production environments enforce HTTPS, `COOKIE_SECURE`, and strict environment validation so tokens never travel in plain text.
Next.js CSP plus Helmet headers block unexpected scripts, frames, and cross-origin requests per docs/ops/32-production-security-checklist.
API traffic is throttled with Redis-backed counters that persist across restarts to contain brute-force attempts.
Users can see active sessions, revoke access, and every sensitive action (password, deletion) lands in AuditLog with 90-day retention.
Users can add authenticator-based 2FA, store recovery codes, and revoking or regenerating factors also revokes active sessions.
Failed login attempts are tracked across email and IP with exponential backoff, lockouts, and Redis persistence across restarts.
Operations
Security is an ongoing operating practice. These notes point back to the same checklist the product follows.
Read the full checklist at docs/ops/32-production-security-checklist.
The broader model lives in docs/architecture/21-security-privacy.
Plain-language stance
The point is to make security posture inspectable before somebody stores real inventory data here.
We publish detect → assess → contain → notify workflows so the response path is explicit before an incident ever happens.
The operations checklist covers uptime monitors, error tracking, and daily Postgres backups with retention expectations already defined.
JWT secrets, webhook secrets, and database connections follow explicit environment validation and secure transport requirements.
Email verification, session review, password-change session revocation, and optional 2FA let users actively protect their own workspace.
We are happy to explain how cookies, CSP, session controls, and two-factor authentication work in practice. Email hello@dokodo.app and we will reply within one business day.
Private by default | No card required | Shared editing on Team