Back to VerifyEat

Security

1. Architecture overview

2. Encryption

3. The LocalMenuServer feature

"Live on Phone" starts a temporary HTTP server bound to your local network so a phone or tablet on the same Wi-Fi can preview the menu. Important to know:

4. Dependencies & supply chain

5. Incident response

Our incident response process:

  1. Detect. Monitor Cloudflare logs, App Store subscription status signals where applicable, and inbound reports.
  2. Triage. Within 24 hours of becoming aware, classify severity and confirm scope.
  3. Contain. Apply mitigations (e.g., revoke compromised keys, deploy a patched build).
  4. Notify. Affected customers and the relevant supervisory authority within 72 hours, where required by GDPR / FADP.
  5. Post-mortem. Public write-up for material incidents.

6. Responsible disclosure

If you believe you have found a security vulnerability in the VerifyEat app, the website, or any related service, please email security@verifyeat.com with:

What you can expect from us:

What we ask of you:

We do not yet operate a paid bug bounty programme but may issue swag, public credit, or discretionary bounties for high-impact reports.

7. How we minimise sensitive data

8. Recommended customer practices

9. Contact

Security disclosures: security@verifyeat.com
General contact: hello@verifyeat.com