How we protect the stack

Security

Security is built around HTTPS, least privilege, explicit linking, protected infrastructure, and controlled review. Players are also expected to protect their own access and use official channels for security concerns.

πŸ”
Least privilegeNot every system, staff role, or automation gets access to every record or feature.
core rule
🧯
Report issues responsiblySecurity issues should come through controlled channels, not public exposure or destructive testing.
required
☁️
Protected edgeThe site is served behind HTTPS and Cloudflare-backed infrastructure protections.
live
Least privilege core ruleReport issues responsibly requiredProtected edge liveLeast privilege core ruleReport issues responsibly requiredProtected edge live