Operational Hygiene
We do not bolt security on after the fact. It is the baseline precondition for every line of code, infrastructure decision, and client engagement we execute.
Philosophy
Generic Service operates within the blast radius of enterprise environments. We assume breach as a natural state, requiring structural defense in depth. Our security posture relies on explicit authorization, immutable audit logs, and hardware-backed isolation—not security-by-obscurity or perimeter fireballs. If we cannot securely stabilize an environment, we refuse the engagement. Our own operational footprint reflects this uncompromising stance.
The Blueprint
Our approach to protecting infrastructure, code, and communications.
Every environment we build or repair includes a tested recovery path. We assume active failures happen, and design primarily for fast, auditable recovery.
Credentials are time-bound, scoped to the specific operational requirement, and programmatically revoked when a sprint concludes.
This public-facing website stores zero client data. All engagements and notes are segregated behind rigorous API gateways and VPN-protected perimeters.
How we process and resolve identified flaws in our infrastructure.
Email security findings to contact@genericservice.app. Use the PGP key listed in our security.txt if the payload is sensitive.
We triage instantly and acknowledge receipt within 24 hours. No auto-responders.
Critical logic flaws are patched via hotfix within 48 hours. Architectural vulnerabilities trigger a full sprint re-architecture.
Once patched, we prioritize open disclosure to the community, scrubbed of specific client data and vectors.
Open Questions
Answering the practical aspects of our security agreements.
Direct all security disclosures and bug bounties through our official channels. Time is critical.