Security
- Password length limits
- Restrict SSH key technologies and minimum length
- Rack attack
- Webhooks and insecure internal web services
- Information exclusivity
- Reset your root password
- User File Uploads
- How we manage the CRIME vulnerability
- Enforce Two-factor authentication
- Send email confirmation on sign-up