We take security seriously. Here's how we approach it and how to report issues.
Our Practices
Data Protection
• Encryption for data at rest and in transit
• Minimal data collection principles
• Regular security reviews
• Secure development practices
Access Control
• Strong authentication requirements
• Principle of least privilege
• Regular access reviews
• Secure credential management
Incident Response
• Clear escalation procedures
• Prompt notification practices
• Root cause analysis
• Continuous improvement
Report a Vulnerability
If you've found a security issue in any of our projects or services, we'd like to hear about it.
Please reach out directly so we can address it promptly.