Security

WitnessOps security practices and policies.

Last updated: March 2026

Security posture

WitnessOps is designed around:

These controls improve auditability and integrity, but do not eliminate external trust assumptions.

Vulnerability reporting

Report vulnerabilities to security@witnessops.com through responsible disclosure.

This mailbox is the canonical security contact. Aliases (e.g. security+witnessops@) may be used for controlled intake but do not replace it.

We aim to:

Testing rules

Do not perform:

If scope is unclear, stop and report.

Verification continuity

Previously issued proof artifacts remain verifiable independently of service availability, provided required public verification material is accessible.

WitnessOps web is a presentation layer only. Verification authority resides in:

Related Legal Documents