eco
LoyaltyTree
OneSeed.green Inc
arrow_back Back to Home
verified_user

Security at LoyaltyTree

Your trust is our foundation. We implement industry-leading security practices to protect your business and customer data.

shield

Our Security Commitment

LoyaltyTree is built with security-first principles. As a Shopify partner handling merchant and customer data, we understand the critical importance of protecting every piece of information entrusted to us.

Last Security Review: January 2026

smart_toy

AI-Built, Continuously Audited

LoyaltyTree is built entirely with AI-assisted development, enabling rapid iteration while maintaining rigorous security standards through continuous automated review.

auto_awesome

AI-Powered Development

Every line of code is written and reviewed by advanced AI systems trained on security best practices. This enables consistent application of security patterns across the entire codebase, eliminating common human errors that lead to vulnerabilities.

loop

Continuous Security Auditing

Security reviews happen continuously as part of development, not just at the end. Every code change is analyzed for potential vulnerabilities, injection risks, authentication bypasses, and data exposure before deployment.

architecture

Architectural Review

AI-driven architectural analysis ensures secure design patterns are followed throughout the application. Multi-tenant isolation, proper access controls, and data protection measures are verified at every layer.

verified

Human Oversight

While AI handles development and initial security review, all major features undergo human review before release. Critical security decisions are approved by the development team to ensure real-world context is considered.

Recent Security Audit Highlights (January 2026)

  • check_circle Client-side code review for sensitive data exposure — all Shopify access tokens sanitized
  • check_circle Authentication flow hardening — mandatory MFA enforcement for all admin accounts
  • check_circle Session security review — 48-hour expiry with secure cookie configuration
  • check_circle API endpoint authorization — all routes verified for proper access control
  • check_circle Password reset security — time-limited tokens with 2-hour expiration
lock

Data Encryption

  • check_circle AES-256-CBC encryption for sensitive data at rest
  • check_circle TLS 1.3 encryption for all data in transit
  • check_circle SHA-256 hashing for customer email addresses
  • check_circle Encrypted API tokens for all third-party integrations
fingerprint

Authentication Security

  • check_circle Mandatory Multi-Factor Authentication (MFA) for all admin accounts
  • check_circle 48-hour session expiry with automatic re-authentication
  • check_circle Secure password hashing using bcrypt with salt
  • check_circle OAuth 2.0 integration with Shopify for seamless, secure access
storage

Infrastructure Security

  • check_circle Serverless PostgreSQL with automated backups via Neon
  • check_circle Environment isolation between development and production
  • check_circle Secure secret management with encrypted environment variables
  • check_circle Regular security updates and dependency patching
admin_panel_settings

Access Controls

  • check_circle Role-based access control with admin and member roles
  • check_circle Multi-tenant data isolation at the database level
  • check_circle SQL-level verification preventing cross-account access
  • check_circle Invite-only registration for platform administration

Shopify Integration Security

verified

Official Shopify Partner

Listed on the Shopify App Store with full compliance verification

sync_lock

HMAC Verification

All Shopify webhooks and proxy requests are cryptographically verified

api

Minimal Permissions

We request only the API scopes necessary for loyalty program operation

Security Practices

code

Secure Development Practices

All code undergoes security review. We use parameterized queries to prevent SQL injection, input validation on all endpoints, and Content Security Policy headers.

history

Audit Logging

Comprehensive logging of authentication events, data access, and administrative actions for security monitoring and compliance.

timer

Token Expiration

Password reset tokens expire after 2 hours. Email verification tokens expire after 24 hours. Session tokens require re-authentication every 48 hours.

backup

Data Backup & Recovery

Automated database backups with point-in-time recovery capabilities. Regular backup testing ensures data can be restored when needed.

Questions About Security?

We're committed to transparency about our security practices. If you have questions or concerns, our team is here to help.

email Contact Security Team