Secure by design.
Every time listen.dev schedules an analysis of your code and its dependencies, it runs a single use container inside a Firecracker micro VM.
Every isolation unit only hosts the workload of a single execution.
Clearly, this is not everything we do…
Defense in depth
We employ a defense-in-depth approach.
Our platform employs multiple network filtering mechanisms to block undesired access at different levels (containers, micro VM, host, infrastructure). All the micro VMs have a hardened nonstock Linux kernel. Run a minimal root filesystem. Have a dedicated unprivileged network. Cannot communicate with each other. Are executed by the Firecracker jailer (which employs seccomp filters) on our hosts. Cannot communicate with other services in our infrastructure, which are physically separate from them.
While building our platform, we will try to be as transparent as possible with our users and with the community.
We will always contribute back any improvements we made to the open source components we build upon.
When it’s not possible to adopt something already existing, we will try to open source solutions we built internally for the benefit of the community.
Think about security by obscurity. We believe in the opposite.
Authentication & Authorization
The listen.dev platform uses GitHub as the source of truth for authentication and authorization.
Report Security Threats
Security is our priority.
We welcome close collaboration with security research communities.