Trust

Impleia's security posture, live.

Everything on this page is observable, dated, and auditable. If you are evaluating us for work that touches sensitive data, this should answer most of your questions in under five minutes.

Current posture
Secrets scan
Clean
Gitleaks + custom patterns on full git history. 0 findings on the public repo.
Dependencies
Patched
Dependabot active. High-severity advisories patched within 7 days.
SAST on every PR
Enforced
Semgrep with OWASP, Next, TypeScript, React rulesets. Blocks merge on findings.
Last audit
2026-04-23
Cross-project baseline. No secrets on pushed history. Every high-severity dependency advisory patched.
Next audit
2026-07-23
Quarterly cadence: Shannon pentest, dependency audit, secret rotation.
Insurance
In progress
Technology E&O + Cyber Liability binding by Q3 2026. Until then, pentest engagements are not offered to external clients.
01 — How we secure our own stack

Four layers, each with the tool we actually use.

Code

Every repository runs static analysis on every pull request. We block merges on findings we cannot reason away, not on warnings.

  • Semgrep (OWASP / Next / TypeScript / React)
  • TypeScript strict
  • ESLint + custom rules

Dependencies

Dependabot watches the tree. CI runs npm audit at high-severity threshold on every push. Shai-Hulud-class provenance checks run on new releases to packages that touch secrets or payments.

  • Dependabot (weekly, grouped)
  • npm audit (high+)
  • Supply-chain provenance on sensitive deps

Secrets

No secret is allowed to reach our git history. A pre-commit hook blocks commits with leaked credentials. CI runs gitleaks on every push and every scheduled sweep. Every key has a rotation date.

  • Gitleaks on CI
  • Custom audit-secrets.mjs pre-commit
  • Credential inventory with quarterly rotation

Runtime

Pre-launch, every Impleia-built site goes through a Shannon pentest against a staging environment with source in hand. Findings are reported with working proofs of concept. We run the same process on our own site on a quarterly cadence.

  • Shannon (white-box AI pentester)
  • Chatbot red-team pass (OWASP LLM Top 10)
  • DNS and email authentication review
02 — Found something?

Please tell us.

If you believe you have found a security issue in anything we operate — impleia.com, a client site we built, an API we expose — report it and we will respond.

security@impleia.com

We commit to an acknowledgment within 24 hours and a first substantive response within 72 hours.

We do not run a paid bounty program today. We will credit you publicly in our changelog (if you want), and for substantive reports we will send a thank-you that is not just a t-shirt.

03 — Authorization to test

Every engagement runs under a written clause.

Before any scan, the client signs a clause that names the in-scope systems, the test window, and the out-of-scope vendors. The clause is written to work on both sides of the U.S.-Mexico border.

United States (federal)
18 U.S.C. §1030
Massachusetts
M.G.L. ch. 266 §120F
Mexico
Código Penal Federal Art. 211 bis-1 through 211 bis-7
04 — Changelog

What changed recently.

2026-04-23
Baseline audit across every Impleia-owned repository. Next.js patched in two projects. CI security pipeline deployed. Credential inventory established.

This page is authored by hand. Badges reflect the state of our public repositories as of the last dated audit. Machine-readable status feeds will be added alongside the next audit.