We perform appropriate validation processing for areas that accept user input.
As part of our product design, we strive to prevent vulnerabilities such as SQL injection, XSS, CSRF, etc., and confirm security through annual security checks by third-party organizations.
Reference: Are regular vulnerability assessments conducted by third parties?
https://help.teachme.jp/hc/en-us/articles/900006443523