Technical documentation of actual security measures implemented in the Succedence platform. No marketing claims—just the code-level protections in place.
Primary authentication layer using Supabase Auth service with email/password and OAuth providers.
Implementation: /middleware.ts, /lib/supabase/client.ts
/ (homepage)/valuation (free tool)/pricing/how-it-works/brokers/blog/*/dashboard/profile/preferences/matches/saved-listings/listings/*/edit/admin (email whitelist)Admin routes protected by hardcoded email whitelist in middleware:
const ADMIN_EMAILS = ['evank8029@gmail.com', 'succedence@gmail.com']Location: /middleware.ts:25-28
All AI and analysis endpoints enforce quota limits based on user plan. Violations are logged to database with IP address and user agent.
Implementation: /lib/middleware/usage-security.ts
usage_violations tableBackground jobs (nightly matching, digest emails) protected by secret header:
x-cron-secret: [CRON_SECRET]/api/match/run (nightly matching engine)/api/cron/daily-tasks (batch operations)/api/cron/upgrade-expired-trials (plan management)Development bypass: DEV_BYPASS_AUTH=true (development only, not in production)
Transparency about security features NOT currently implemented:
Documentation of sensitive configuration required for deployment. All values stored in .env.local (not committed to git).
| Variable | Purpose | Required |
|---|---|---|
NEXT_PUBLIC_SUPABASE_URL | Supabase project URL | Yes |
NEXT_PUBLIC_SUPABASE_ANON_KEY | Public API key (client-side) | Yes |
SUPABASE_SERVICE_ROLE_KEY | Admin operations (server-side only) | Yes |
OPENAI_API_KEY | AI analysis features | Optional |
STRIPE_SECRET_KEY | Payment processing | Yes |
STRIPE_WEBHOOK_SECRET | Webhook signature verification | Yes |
CRON_SECRET | Cron job authentication | Yes |
AI_FEATURES_ENABLED | Toggle AI functionality | Optional |
DEV_BYPASS_AUTH | Development mode (NEVER in production) | Dev only |
Security Warning: Service role key and Stripe secret have full database access and payment authority. Never expose in client-side code or commit to version control.
If you discover a security vulnerability in Succedence, please report it responsibly:
Email: evank8029@gmail.com
We'll acknowledge receipt within 48 hours and provide a timeline for resolution.
Contact us for enterprise security documentation or compliance questionnaires.
Contact Us