Plainly-worded security posture. We list what we actually do, not aspirational claims. If something below is wrong or out of date, email us and we'll fix it.
Last reviewed: 13 May 2026
If you discover a security vulnerability, please report it privately rather than publishing it. We commit to:
In scope: the production application at vyrable.ai, the public REST API at /api/v1, the MCP server at /api/mcp, and any subdomain we operate.
Out of scope: denial-of-service, social engineering, physical attacks, vulnerabilities in third-party services we depend on (those should be reported to the vendor), and unsubstantiated scanner output.
Reports go to security@vyrable.ai. Please include reproduction steps, the affected URL or endpoint, and (where applicable) any relevant request / response headers. PGP-encrypted reports are accepted via the public key at /.well-known/security.txt.