Our Guide to Security Reports
As a founder, you wear a lot of hats. One of mine is handling the security reports that land in our inbox.
Thanks to a strong security posture, including regular third-party pen tests, genuine vulnerability reports are rare. However, like any online business, we see a steady stream of security inquiries. These tend to fall into two distinct camps: the valuable, good-faith reports from legitimate researchers... and the noise.