6ix — Security
Security at 6ix is layered across product, infrastructure, and operations. This page explains how we protect accounts and data, how we respond to incidents, and how to report vulnerabilities responsibly.
Last updated: 2025-10-28
1) Account security
Best practices
- Use a unique, strong password; consider a password manager.
- Enable 2FA. Treat one-time codes like passwords—never share them.
- Review active sessions and revoke anything unfamiliar.
- Beware of phishing: we never ask for your password via email or DM.
If you’re compromised
Reset your password, revoke sessions, and turn on 2FA. If you can’t access your account, contact security@6ixapp.com. Refund decisions follow Refunds & Cancellations.
Verification ticks
Blue and white ticks verify identity/eligibility, not immunity to policy. Keep 2FA on, use trusted devices, and avoid sharing credentials across teams.
2) Authentication & session
Login & 2FA
We support modern auth and optional 2FA. Risk-based checks may trigger extra verification (e.g., device, IP, or geolocation challenges) to reduce account takeover.
Session security
Sessions use secure cookies with appropriate flags. We rotate and invalidate tokens on sign-out and major changes (e.g., password reset). Idle timeouts may apply to sensitive flows.
Rate limits & abuse controls
We apply rate limiting and automated detection to mitigate credential stuffing, enumeration, and brute force attempts. Suspicious attempts can be blocked or stepped up with challenges.
3) Data storage & encryption
Encryption
Data is encrypted in transit (TLS) and at rest. Secrets are rotated and scoped by environment with access controls and auditing. Stored credentials use industry-standard hashing.
Payments
Card details are processed by PCI-compliant partners; 6ix never stores full card numbers. Billing and charge logic are governed by Billing & Subscriptions.
Backups & retention
We maintain redundant backups and test restoration. Retention follows necessity and legal requirements. See Privacy — Retention.
4) Infrastructure & access
Cloud & network
We run in hardened cloud environments with segmented networks, managed perimeter protections, WAF, DDoS mitigation, and least-privilege service roles.
Secrets & CI/CD
Build pipelines enforce checks (lint, types, tests). Artifacts are signed where supported. Secrets are managed centrally and not embedded in source control.
Administrative access
Admin actions require SSO + MFA and are logged. Production data access is limited to roles that need it and approved break-glass flows with audit trails.
5) Application security
Secure development lifecycle
We use code review, dependency scanning, static analysis, and container/image scanning. High-risk changes require additional review and monitoring gates.
Protecting creators & fans
We sanitize input and apply defense-in-depth to mitigate XSS, CSRF, injection, SSRF, and access-control issues. Content safety systems and abuse tooling protect the community.
Data minimization
We only collect what’s needed to run the service and pay creators. For KYC/KYB and AML specifics, see KYC / AML & Sanctions.
6) Monitoring, logging & resilience
Observability
Centralized logs, metrics, and traces support anomaly detection and rapid response. Access to logs is controlled and audited.
Resilience & recovery
We design for graceful degradation. Disaster-recovery runbooks and exercises validate our ability to restore critical services within target objectives.
Third-party risk
Vendors undergo security and privacy review. Where possible, we isolate integrations and restrict scopes to the minimum required.
7) Incident response
Playbooks & ownership
We maintain severity-based playbooks covering detection, triage, containment, eradication, and recovery. Each incident has an owner, comms channel, and timeline.
User & regulator notifications
If a breach materially affects users, we notify affected users and (where required) regulators within applicable timelines. We share actionable guidance to help you stay safe.
Post-incident review
We run RCAs and track corrective actions to completion (fixes, tests, additional monitoring). Learnings feed back into our controls and training.
8) Vulnerability reporting (coordinated disclosure)
How to report
Email security@6ixapp.com with steps to reproduce, impacted domains, and your contact. Do not access other people’s data, disrupt service, or exfiltrate data.
What we commit to
- Acknowledge your report quickly.
- Keep you updated as we validate and remediate.
- Credit responsible researchers where appropriate.
Scope notes
Social engineering, rate-limit bypass without impact, and issues in third-party platforms are typically out-of-scope. If unsure, ask us first.
9) Compliance & privacy
Privacy program
We align to regional privacy laws and process data per our Privacy Policy. We perform DPIAs for higher-risk projects and apply privacy-by-design principles.
Payments & KYC/AML
Payments are handled by regulated partners. Identity checks and AML controls are described in KYC / AML & Sanctions.
Acceptable use
Platform safety relies on our community rules. See Acceptable Use and Safety.
10) Related policies
Billing & Subscriptions
Payments, renewals, and limits: /legal/billing
Refunds & Cancellations
Eligibility and timelines: /legal/refunds
Disputes & Chargebacks
Evidence and outcomes: /legal/disputes
KYC / AML & Sanctions
Verification and sanctions screening: /legal/kyc-aml
Law Enforcement
Valid process and emergencies: /legal/law-enforcement
11) Frequently asked questions
Can staff read my private messages or files?
No. Access to production data is tightly restricted and audited. Limited access may be granted to resolve specific incidents or comply with law. See Privacy — Sharing.
Do you support SSO for organizations?
For eligible tiers, yes. Contact support@6ixapp.com.
How do I get security updates from 6ix?
Follow our status page (when published) and product changelogs. Critical notices are delivered in-product or via email.