Security Intelligence

Report
Vulnerability

Help us strengthen the core. Submit detailed reports on potential security flaws or anomalies.

Encrypted Transmission

Your report is encrypted end-to-end. We review all submissions within 24 hours. Critical issues may be eligible for our bug bounty program.