Skip to content

Security policy

Coordinated vulnerability disclosure.

Reporting a sensitive vulnerability

For any of the following classes, do not open a public issue:

  • Authentication or authorisation bypass.
  • Customer-data exposure or cross-tenant leakage.
  • Remote code execution.
  • Supply-chain compromise (signed-artefact integrity, CI / CD).
  • Cryptographic weakness in our protocols.
  • Adversarial or model-evasion findings against deployed models that affect production.
  • Any vulnerability in autonomous-decision pipelines.

The founders read security@ directly. Rotation to a dedicated security team is announced in the changelog. The PGP key fingerprint is published below.

Email: [email protected]
PGP key: /.well-known/pgp-key.asc

Our commitments to disclosers

  • Acknowledgement within 24 hours of receipt.
  • Initial scoping within 5 business days.
  • Remediation timeline communicated within 10 business days.
  • Coordinated disclosure timed to fix-deployment-readiness.
  • Safe harbour: no legal pursuit of good-faith research; no NDA required for disclosure.