Security Policy
Last updated: May 21, 2026
We take the security of NSS Background Remover seriously. Because the tool processes images entirely in your browser, the attack surface is narrower than typical web applications — there is no image upload server, no user database, and no authentication system. However, the static hosting, CDN, service worker, and client-side code all warrant careful attention.
The machine-readable version of this policy is also available at /.well-known/security.txt.
Reporting a vulnerability
If you believe you have found a security vulnerability in NSS Background Remover, please report it to us by email:
security@novusstreamsolutions.comPlease include as much detail as possible:
- A description of the vulnerability and its potential impact
- Steps to reproduce or proof-of-concept code
- The URL or component affected
- Your contact information (optional, but helpful for follow-up)
We aim to acknowledge all security reports within 48 hours and to provide an initial assessment within 5 business days.
Scope
The following are in scope:
- bgremover.novusstreamsolutions.com and all subpaths
- The service worker and caching behaviour
- Content Security Policy bypass
- Cross-site scripting (XSS)
- Any vulnerability that could affect user privacy or data integrity
The following are out of scope:
- Social engineering attacks targeting our staff
- Physical security
- Denial of service (DoS/DDoS) attacks
- Reports from automated scanners without manual validation
- Third-party services (Vercel infrastructure, Hugging Face CDN) — please report those to the respective vendors
- Vulnerabilities requiring a compromised device or browser
Our commitments
- We will not pursue legal action against researchers acting in good faith under this policy.
- We will acknowledge your report promptly and keep you informed of our progress.
- We will credit you in our security changelog (if you wish) when a valid vulnerability is resolved.
- We ask that you not disclose publicly until we have had a reasonable opportunity to address the issue — typically 90 days.
Security design principles
- No image upload: Images are processed on-device. There is no server endpoint that accepts image data.
- Content Security Policy: A CSP header restricts script sources, worker sources, and connection targets. Currently in Report-Only mode during the launch period; enforced mode is planned before general availability.
- COOP/COEP: Cross-Origin Opener Policy and Cross-Origin Embedder Policy are set on the editor route to enable SharedArrayBuffer (multi-threaded WebAssembly) without relaxing the default browsing context security.
- No secrets in client bundle: All client-side environment variables are prefixed
NEXT_PUBLIC_and contain only non-sensitive public identifiers.
Bug bounty
We do not currently operate a paid bug bounty program. We offer public acknowledgement and our genuine gratitude for valid, responsibly disclosed reports.