Loading...
Loading...
Security is foundational to VexNode's architecture. We built our platform with the assumption that every layer — from network transport to GPU memory — must be isolated, encrypted, and auditable. Enterprise workloads demand nothing less.
Last updated: March 2026
We value the work of security researchers who help keep VexNode and our users safe. If you discover a vulnerability, please report it responsibly.
Send your findings to security@vexnode.ai with a detailed description of the issue, steps to reproduce, and any supporting evidence. We will acknowledge receipt within 24 hours and aim to provide an initial assessment within 5 business days.
We ask that you do not publicly disclose the vulnerability until we have had a reasonable opportunity to address it. We do not pursue legal action against researchers acting in good faith.