Cavuno
  • Features
  • Examples
  • Documentation
  • Blog
  • Tools
  • Pricing
  • Contact
Sign InSign Up
Cavuno

AI job board software that runs itself

Product
  • Features
  • Integrations
  • Examples
  • Documentation
  • Tools
  • Blog
Compare
  • Alternatives
  • Comparisons
Company
  • About Us
  • Contact
  • Trust Center
  • Status

© Copyright 2026 Cavuno. All Rights Reserved.

Terms of ServicePrivacy PolicyCookie PolicySecuritySubprocessorsData Processing Agreement

Security

How we protect your data and your customers' data

Last updated: 1 March 2026

Our approach to security

At Cavuno, we take the security of your data and your customers' data seriously. As a multi-tenant platform that hosts job boards for organizations of all sizes, we understand the responsibility that comes with managing sensitive information on your behalf. This page describes the measures we take to protect data across our platform.

Infrastructure and hosting

Cavuno is built on industry-leading cloud infrastructure from providers with strong security track records.

  • Application hosting — Our application is hosted on Vercel, which provides automatic TLS certificates, DDoS protection, and a globally distributed edge network. Vercel maintains SOC 2 Type II compliance.
  • Database — Our database is hosted on Supabase, which runs on Amazon Web Services (AWS). Supabase enforces encryption at rest using AES-256 and encryption in transit using TLS 1.2+. Supabase maintains SOC 2 Type II compliance. The underlying AWS infrastructure maintains SOC 2 Type II, ISO 27001, and PCI DSS Level 1 compliance.
  • Vector search — Semantic search is powered by Qdrant Cloud, which maintains SOC 2 Type II compliance with encryption at rest and in transit.

We do not operate our own data centers. By building on established infrastructure providers, we benefit from their significant investments in physical security, redundancy, and compliance programs.

Data residency

All primary infrastructure is located in the United States (US East). This includes our database (AWS us-east-1), application servers (Vercel us-east-1), vector search (Qdrant us-east-1), and analytics (Tinybird us-east-1).

Backup and disaster recovery

Our database is backed up daily by Supabase, with backups retained for 7 days. Database logs are retained for 7 days. Backups are encrypted at rest. In the event of data loss or corruption, we can restore to any point within the backup retention window.

Encryption

In transit

All data transmitted between your browser and Cavuno is encrypted using TLS 1.2 or higher. This applies to all pages, API endpoints, and webhook callbacks. We enforce HTTPS across all connections — HTTP requests are automatically redirected.

At rest

All data stored in our database is encrypted at rest using AES-256. This includes job listings, company profiles, account information, and any other data you store on the platform. Database backups are also encrypted.

Authentication

User authentication is handled by Supabase Auth. Passwords are hashed using bcrypt and are never stored in plain text. We support multi-factor authentication (MFA) for additional account security.

Session tokens are securely managed using HTTP-only cookies with appropriate SameSite and Secure flags. CSRF protection is enforced on all form submissions.

Multi-tenant data isolation

Cavuno is a multi-tenant platform, meaning multiple customers share the same infrastructure. We enforce strict logical data isolation using PostgreSQL Row-Level Security (RLS) policies at the database level.

RLS ensures that database queries can only access data belonging to the authenticated account. This is enforced by the database engine itself, not application code, providing an additional layer of protection against data leakage between tenants.

Payment security

All payment processing is handled by Stripe. Credit card numbers, CVVs, and other sensitive payment data are submitted directly to Stripe and never touch our servers. Stripe is a PCI DSS Level 1 certified service provider — the highest level of certification in the payments industry.

Development practices

  • The codebase is written in TypeScript with strict type checking enabled
  • Development and production environments are separated
  • Server-side input validation using schema validation on all API endpoints and server actions
  • AI-assisted code review on pull requests to identify bugs, security concerns, and performance issues
  • Webhook signature verification on all incoming third-party webhooks (e.g. Stripe)
  • File upload validation including MIME type checking and file size limits
  • Automated dependency vulnerability scanning using Snyk, with alerts for known CVEs in production dependencies

Logging and monitoring

Database and infrastructure logs are retained by Supabase for 7 days. Security-relevant events are monitored and reviewed as part of our incident response process.

Security headers

We set security headers on all responses, including Strict-Transport-Security (HSTS) with includeSubDomains, X-Content-Type-Options, and X-Frame-Options.

Access control

Access to production systems is restricted to authorized personnel and governed by the principle of least privilege. SSO and MFA are used when available.

Responsible disclosure

If you believe you have discovered a vulnerability within Cavuno's application, please submit a report to us by emailing hi@cavuno.com. Cavuno does not participate in a bug bounty program at this time, nor do we provide monetary rewards for findings.

We ask that you give us reasonable time to investigate and address the issue before disclosing it publicly. We will acknowledge receipt of your report within 2 business days and aim to provide an initial assessment within 5 business days.

Incident response

In the event of a security incident, we follow a structured incident response process that includes containment, investigation, remediation, and notification. In accordance with Australia's Notifiable Data Breaches scheme, we will notify affected users and the Office of the Australian Information Commissioner (OAIC) if a breach is likely to result in serious harm.

Subprocessors

For a complete list of third-party subprocessors that may process data on our behalf, see our Subprocessors page.

What we don't do (yet)

We believe in being upfront about the boundaries of our security program. As a small team, there are areas we haven't addressed yet:

  • We have not completed an independent SOC 2 Type II audit of our own organisation. Our infrastructure providers (Supabase, Vercel, Qdrant) each maintain SOC 2 Type II compliance, but we have not pursued our own certification.
  • We have not commissioned an external penetration test. We rely on automated vulnerability scanning (Snyk), AI-assisted code review, and internal security assessments.
  • We do not operate a bug bounty program or offer monetary rewards for vulnerability reports at this time.

We are actively evaluating these areas and will update this page as our security program matures.

Questions

If you have questions about our security practices or would like to request additional information, please contact us at hi@cavuno.com.