@kipme001 It all comes down to following best practices in the way you build the app as well as understanding what the different attack vectors are and preemptively putting up safeguards. In addition to Bubbles documentation, there is an excellent resource from AirDev that talks about security best practices that I highly recommend here https://build.airdev.co/wiki/best-practices-on-security-for-bubble-applications?tab=Summary.
In addition to following general best practices, there are specific solutions that can be implemented depending on the type of “attack” or unwanted user behavior you are experiencing. For example, If it is a bot doing the sign ups, you could implement a bot detection solution such as a captcha. If you are sure it is an actual individual person, you could capture their IP address from their browser and then build a workflow on page load that scans the current users IP address against a list of banned IPs you have stored in your DB and when they come to your app and your page loads if there it a match in banned IP then redirect them away from your app (like to google or the FBI website) or to a you are blocked page on your app. You could require email verification for sign ups by sending them a link in the email that is registered that way only real emails can be used., etc. There are many more pointed solutions like this depending on the problem you need to solve. Hope this helps!
PS - If you would like, I would be happy to spend a few minutes with you to look at your app and tell you if I see any gaping security holes. I build Bubble apps for a very large enterprise company we get attacked by hackers constantly and we also go through continuous security and penetration testing so I have a lot of experience securing Bubble apps.
1 Like