Defense in depth
We use standard web security practices, including HTTPS for traffic between your browser and our services and access controls around internal systems.
Responsible product development
We review changes before release and pay attention to risky dependencies, secrets handling, and authentication flows.
Operational monitoring
We monitor for failures and suspicious behavior so we can investigate issues and keep the product stable.
Security reporting
If you think you have found a vulnerability, we want to hear about it and will work with you on a responsible fix.