Payment & Code Validity, Security

At ChartGenie, we take security seriously — for both your data and the stability of our platform. We’ve implemented multiple layers of protection to ensure a safe, fair, and reliable experience.

✅ Intelligent Usage Controls

To protect our servers and ensure fair use for all:

  • Per-Agent Quotas: Each subscription has a daily request limit per agent (e.g., 75 for personal, 200 for group plans), resetting at midnight. This ensures consistent performance and prevents system overload.

  • Group Menu Isolation: When a group subscription is used to trigger an agent menu in a shared Telegram group, only the user who called it can interact with that menu. This prevents accidental or malicious interference from others.

🕵️‍♂️ API & Abuse Monitoring

We actively monitor for:

  • Data leaks

  • Abuse of API endpoints

  • Suspicious or automated behavior

ChartGenie’s backend includes real-time logging and abuse prevention systems to immediately flag and respond to potential misuse.

🔐 Payment & Code Validation

We implement several safeguards to ensure safe and secure payment handling:

  • License codes (e.g., genie-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx) and payment requests are only valid for 10 minutes. After this, the session auto-expires and must be restarted.

  • Payments are processed via user-generated Solana wallets, secured and encrypted. Only the exact plan amount is deducted — no overdraws or hidden fees.

  • License redemption is verified with backend checks to prevent reuse, tampering, or unauthorized access.

🚫 Brute Force Prevention

ChartGenie includes protections against brute-force attempts, including:

  • Rate-limiting on sensitive actions like login, plan redemption, and dashboard access

  • Token/session expiry timers

  • Logging of failed validation attempts and automated temporary locks

🧠 Subscription Enforcement

Before every analysis, command, or data request, the bot performs a real-time subscription check. This ensures:

  • You have an active and valid plan

  • Your quotas have not been exceeded

  • You're authorized to access the feature you're using

If not, you’ll receive a helpful response explaining why and how to resolve it.

🛑 Injection & Abuse Protection

We implement robust protection against:

  • SQL injection attempts

  • Command injection attacks

  • Payload tampering

  • Cross-agent spoofing

All user input is validated and sanitized server-side before any processing occurs. We also monitor traffic for unusual patterns to detect abuse or automated exploitation.

Payment & Code Validity

Encrypted Data

Everything is logged & Monitored

Last updated