Security
Security is woven into how we operate—access control, encryption in transit, and clear audit boundaries.
Practices
- All traffic uses HTTPS/TLS.
- Role‑based access with least‑privilege defaults.
- Operational playbooks and regular reviews.
Responsible disclosure
If you believe you have found a vulnerability, please contact us. Do not publicly disclose until we have addressed the issue.