We at trakked are fortunate to be able to simplify the management and updating of Contao installations for many customers in the Contao community. Of course, this also makes us an interesting target for attacks, the effects of which we are very aware of.

We would like to inform you below about the measures we are taking to minimise the risk:

Secure infrastructure and access

  • Two-factor authentication (2FA) or passkeys:
    All server access is protected accordingly.
  • Location Switzerland:
    Our servers are located in Basel with the Swiss hosting provider cyon.
  • Certified data centre:
    Strict security requirements in accordance with ISAE 3402 and SSAE 16 Type II.
  • Encrypted access:
    App and website are fully secured via https.

Security measures for data access

We take preventive measures to prevent data leaks. However, should unauthorised people nevertheless gain access to our database, we have also taken precautions:

  • Minimal profile data: Your personal account consists solely of your first name and surname. In addition, there are passwords that we hash according to the latest standards and which are therefore unusable for an attacker.
  • Reduced access rights: In order to install Contao updates, you give us access to the Contao Manager, so we store the Contao Manager API tokens in our database. An attacker could use these to perform unwanted operations on your installation. We prevent this by giving the Contao Manager different access authorisations from version 1.9 onwards. Accordingly, we ensure that our API tokens can access the Manager with the update scope and are only allowed to perform non-destructive tasks
    • The update scope is not allowed to add or delete new packages. It may only perform an update with the existing dependencies. This ensures that an attacker cannot install a Composer package with malicious code via the API with our token.
    • The update scope ensures that no other potentially destructive tasks may be executed. It is possible to perform database migrations, but only those that are suggested. No arbitrary SQL queries can be executed.
  • Secure login from trakked: The Contao Manager can be called up directly from within trakked and you are logged in directly. This is also done with the update scope. You can therefore only perform the non-destructive tasks in the Contao Manager. If you want to install a package, you have to log in with an admin account, which trakked does not have.
  • Composer protection: Since version 1.10 of the Contao Manager, the validation of composer.lock also ensures that no malicious packages can be foisted on you, even if you take over the Composer Resolver Cloud and/or trakked.io.
  • Regular token change: We rotate our tokens every approx. 12 hours. This means that if the database falls into the hands of an attacker after this period, all tokens are already invalid.