Built with operator-grade security, audit trails, and responsible disclosure.
We take security seriously—because you do.
Content Security Policy blocks inline scripts, requires HTTPS, and allows only whitelisted origins.
All Pulse ingests require HMAC signatures. No unsigned payloads are processed.
Every event is logged with timestamp, tenant, and payload hash for full traceability.
Role-based access control, scoped API keys, and tenant isolation by default.
Pulse events retained for 30 days. No PII stored unless explicitly provided in payload.
All traffic encrypted in transit. No HTTP, no exceptions.
Email: security@nexusbase.tech
Subject: SECURITY — [short summary]
Include minimal reproduction steps, affected components/endpoints, and any PoC.
Do not exfiltrate data or perform destructive actions.
*.nexusbase.tech/api/pulse/ingest, /api/entitlements, etc.We support good-faith security research. If you act in good faith, avoid privacy violations, and do not disrupt services, we will treat your report as authorized under this policy.
Acknowledgment: within 24 hours
Triage & fix timeline: depends on severity (communicated in initial response)