We conduct appropriate validation processes for all areas that accept user input.
As part of our product design, we strive to prevent vulnerabilities such as SQL injection, XSS, CSRF, etc., and verify security through annual security checks by third-party organizations.
Reference: Are regular vulnerability assessments conducted by third parties?
https://help.teachme.jp/hc/en-us/articles/900006443523