Security
High-level practices and a channel to report suspected vulnerabilities.
1. Practices
We lean on established identity providers and cloud-native controls, enforce least privilege and monitor for abuse.
2. Reporting
Email “Security report” with safe reproduction notes and severity context — no destructive testing on production without approval: