Security Intelligence
Report
Vulnerability
Help us strengthen the core. Submit detailed reports on potential security flaws or anomalies.
Encrypted Transmission
Your report is encrypted end-to-end. We review all submissions within 24 hours. Critical issues may be eligible for our bug bounty program.