NamiDB
Security

Tell us, in confidence,
what you found.

The engine is in private beta. The marketing site you are reading is the only public surface. If you have found a vulnerability in either — please write to us before publishing. We will respond within one business day and credit you in the postmortem, with your permission.

1. What's in scope

The following surfaces are in scope for coordinated disclosure:

  • This website (namidb.com) and any subdomain we operate.
  • The NamiDB engine code in the public repository.
  • Any private-beta cloud namespace assigned to your team — within your namespace only.

2. What's out of scope

  • Findings that require physical access to our hardware.
  • Social-engineering attempts against teammates, partners, or contractors — we do not consider these meaningful tests of the system.
  • Best-practice nudges with no demonstrable impact (e.g. missing CSP headers on this static site).
  • Anything that requires denial-of-service against shared infrastructure.

3. Our commitment

  • We respond within one business day.
  • We will not pursue or threaten action against good-faith research within the scope above.
  • The engine source is published under BSL 1.1 — you can audit the security properties of the code yourself before depending on it.
  • When a fix lands, the postmortem is published in /research within seven days — with credit to you, unless you ask to stay anonymous.
  • A public reward program will go live when the engine enters public beta. Until then, we offer thanks, swag, and a named place in the postmortem.

4. Our practices

  • All production secrets are stored in a dedicated vault. No long-lived shared credentials.
  • Dependencies are pinned and scanned. Every release notes the dependency tree it was built against.
  • Backups of waitlist data are encrypted at rest and tested for restore on a monthly cadence.
  • The engine's storage layer uses authenticated writes against object storage — no shared keys, no long-lived ones.

PGP key

For sensitive reports, encrypt against the security inbox key. Fingerprint below — request the full key block by emailing security@namidb.com.

pub   ed25519 2026-01-01 [SC]
      9F4C 1E27 8A0B 4D31 5C8F  6B22 3E11 7A04 D02F E891
uid   NamiDB Security <security@namidb.com>

Build the next decade with us.

Early-access is open. One launch email when the engine is ready — never spam.