Trust

Security

Last updated: March 22, 2026

Application Controls

We apply origin checks, security headers, validation, and abuse controls across key public endpoints.

Operational Security

We follow least-access principles for production environments and continuously review platform configuration, observability, and incident response readiness.

Responsible Disclosure

If you discover a potential vulnerability, report details to hello@nexoris.in with reproduction steps. We review and respond as quickly as possible.

Enable ambient audio