Security

Security is woven into how we operate—access control, encryption in transit, and clear audit boundaries.

Practices

  • All traffic uses HTTPS/TLS.
  • Role‑based access with least‑privilege defaults.
  • Operational playbooks and regular reviews.

Responsible disclosure

If you believe you have found a vulnerability, please contact us. Do not publicly disclose until we have addressed the issue.