Security at Telos

We treat security as a core product requirement, not an afterthought.

Least Privilege

We enforce strict access controls. Access is granted only when necessary and revoked immediately when not.

Auditability

Changes to infrastructure and data are logged and auditable. We know who did what, and when.

Responsible Disclosure

We welcome reports from the security community and address vulnerabilities promptly.

Report a Vulnerability

If you believe you have found a security vulnerability in any Telos Technologies product, please report it to us immediately.

What to include:

  • A detailed description of the vulnerability
  • Steps to reproduce the issue
  • The product or service affected (e.g., PGPulse, BaseKit)
  • The potential impact of the vulnerability