Security at Postbox
You trust us with your data and your users' data. We take that seriously. This page describes how we protect it - and how we verify that protection.
Internal Security Audit - February 2026
We run continuous static analysis on every code change using industry-standard tools. Our latest full audit completed with:
Tools: Sobelow (Phoenix security scanner), mix deps.audit (CVE database), Credo (static analysis)
Infrastructure
Postbox is deployed on secure infra with isolated application instances and encrypted storage volumes. All connections are served over TLS 1.2+ - there is no unencrypted path to the application. Database connections use SSL. HSTS headers enforce HTTPS for all clients. Request body size is limited to prevent abuse.
Authentication
We support email/password, magic links, and social login via Google and GitHub. Multiple layers protect your account:
Data Protection
Every database query is scoped to the authenticated user at the query level - not just the application level. Account data is tenant-isolated by design:
Application Security
Rate Limiting
Every public and authenticated endpoint is rate-limited to prevent abuse:
AI Data Handling
AI features (spam detection, translation, smart replies) are opt-in per form and disabled by default. When enabled, only the minimum submission data needed is sent to the AI provider over encrypted connections. You can disable AI processing on any form at any time.
Responsible Disclosure
If you discover a security vulnerability, we want to hear about it. Please report it to support@usepostbox.com with a description of the issue. We commit to:
Please do not publicly disclose vulnerabilities before we've had a chance to address them.
What's Next
Security is ongoing. Here's what we're working toward: