Security

Our approach to security, data handling, and infrastructure protection.

Data Handling

GXO Feeds processes and stores product data on behalf of brands. We treat all data with the highest level of security and privacy:

  • All data is encrypted in transit (TLS 1.3) and at rest (AES-256)
  • Product feeds are stored in secure, access-controlled storage buckets
  • We do not collect or store personally identifiable information (PII)
  • Access logs are retained for 90 days for security monitoring

Infrastructure Security

Our infrastructure is built on industry-leading cloud platforms with multiple layers of security:

  • Hosted on Vercel with automatic DDoS protection
  • CDN-backed feed delivery with edge caching
  • Rate limiting and abuse prevention on all endpoints
  • Regular security audits and penetration testing

Brand Verification

We verify brand ownership through domain validation to prevent impersonation and ensure feed authenticity:

  • DNS-based domain verification for brand claims
  • Verified badges for authenticated brands
  • Regular re-verification of brand ownership

Responsible Disclosure

If you discover a security vulnerability, please report it to us immediately:

security@gxo.dev

We take all security reports seriously and will respond within 24 hours. Please do not publicly disclose vulnerabilities until we've had a chance to address them.

Compliance

GXO Feeds is committed to maintaining compliance with relevant data protection regulations including GDPR and CCPA. For more information, see our Privacy Policy.

Security | GXO Feeds