In the name of Allah, the Most Gracious, the Most Merciful.
Security is a core value at Badal Technologies. We view the protection of user data and infrastructure as an Amanah (Trust). We are committed to ensuring the Iqra AI platform remains secure, reliable, and private for all users.
We actively maintain and provide security updates for the following versions:
| Version | Supported | Notes |
|---|---|---|
| Latest | ✅ | We recommend always running the latest stable release or the main branch. |
| < 1.0 | ❌ | Older versions are not actively monitored for security patches. |
If you discover a security vulnerability within the Iqra AI codebase, the Cloud Platform (app.iqra.bot), or our SDKs, please DO NOT open a public issue on GitHub.
Please email our security team directly at: security@iqra.bot
In your email, please include:
- Type of issue (e.g., XSS, Injection, RCE, Authentication Bypass).
- Full proof of concept or steps to reproduce the issue.
- Impact assessment (what data or systems are at risk?).
- Acknowledgment: We will acknowledge receipt of your report within 48 hours.
- Assessment: Our engineering team will validate the issue and determine the severity within 1 week.
- Resolution: We will work on a fix immediately. We ask that you maintain confidentiality during this period.
- Disclosure: Once the fix is released, we will credit you (if desired) in our release notes and Security Hall of Fame.
- Iqra Core Engine: Vulnerabilities in the .NET 10 Backend, Proxy, or Background services.
- Frontend Dashboard: Authentication bypasses, XSS, or data leakage in the dashboard.
- SDKs: Vulnerabilities in the Web Widget or Middleware that could expose API keys.
- FlowApps: Security flaws in the logic of official FlowApp integrations (e.g., Cal.com).
- DDoS Attacks: Volumetric attacks against our infrastructure.
- Social Engineering: Attacks targeting our employees or community members.
- Self-Hosted Misconfiguration: Vulnerabilities caused by the user's failure to secure their own server (e.g., leaving MongoDB ports open to the public, weak passwords, failing to configure firewalls).
- Third-Party Providers: Vulnerabilities within Twilio, OpenAI, or other providers, unless caused by our integration implementation.
If you are self-hosting Iqra AI, you assume the role of the System Administrator. The code is secure, but your deployment environment must also be secure.
Mandatory Security Practices:
- Change Defaults: Immediately change the default Admin Email and Password in
appsettings.jsonupon first deployment. - Secure the Data Layer: Ensure MongoDB (
27017) and Redis (6379) are NOT exposed to the public internet. They should only be accessible within your internal Docker network. - API Secrets: Generate a strong, random string for the
ApiSecretTokenused for the internal handshake between Proxy and Backend. - HTTPS: You must use a Reverse Proxy (Nginx/Caddy) with valid SSL certificates. WebRTC and Microphone access will fail over insecure HTTP.
- Firewall: Only expose the necessary ports:
80/443(HTTP/HTTPS)10000-20000(UDP - Audio RTP)- Block all other inbound ports.
In the unlikely event of a data breach on the Iqra Cloud platform:
- We will notify affected users via email within 72 hours of confirmation.
- We will provide a transparent post-mortem detailing what happened and what steps were taken to prevent recurrence.
Thank you for helping us keep You, Our Customers, and Our Community safe.