Trust
Security
Last updated: March 22, 2026
Application Controls
We apply origin checks, security headers, validation, and abuse controls across key public endpoints.
Operational Security
We follow least-access principles for production environments and continuously review platform configuration, observability, and incident response readiness.
Responsible Disclosure
If you discover a potential vulnerability, report details to hello@nexoris.in with reproduction steps. We review and respond as quickly as possible.