We investigate security incidents for a living. Our own infrastructure is held to the same standard we hold the threats we catch. Every access decision is logged. Every verdict is audited. No black boxes here either.
The n0limit platform runs on cloud infrastructure operated by Tier-1 providers with physical security, redundancy, and independent compliance certifications. All production systems are hosted in SOC 2 Type II and ISO 27001 certified data centers.
Security telemetry is the most sensitive data in a SOC. We treat it accordingly.
The principle of least privilege is enforced throughout the platform — both for end users and for n0limit employees.
We maintain a documented incident response plan, tested twice per year with tabletop exercises. Severity tiers and escalation paths are documented and role-assigned.
status.n0limit.com within 15 minutes of detectionIf you've identified a security issue in n0limit's platform, infrastructure, or public-facing properties, we want to hear from you. We treat every report seriously and respond on the same timeline we hold ourselves to for our customers.
security@n0limit.comPGP key available on request for encrypted disclosures.
In scope: n0limit platform, API endpoints, web application, and customer-facing infrastructure. Out of scope: social engineering, physical security testing, denial-of-service attacks, and third-party services we do not control.
Researchers who report in good faith, act within this scope, and do not access or modify customer data will not face legal action from n0limit. We are committed to coordinated and fair disclosure.
Compliance documentation available to current and prospective customers under NDA:
For vulnerability reports, security concerns, or compliance documentation requests: