Skip to content
Security Practices
- Least-privilege access controls across environments
- Credential and secret lifecycle management
- Patch management and dependency update cadence
- Monitoring and alerting for security-relevant events
- Documented incident response and post-incident review
Vulnerability Reporting
- Report vulnerabilities to [email protected] with reproducible steps and impact details.
- Acknowledgment target: within 2 business days.
- Triage status and remediation timelines are shared after validation.
- Please avoid accessing customer data beyond what is needed to demonstrate the issue.