Skip to main content

Continuous hacking to our technology

We have projects focused on hacking our own software. For us, it is essential to set an example of secure software, which is why today our entire technology stack goes through a process of comprehensive Continuous Hacking.

All our development projects run Continuous Integration pipelines, including exploits and strict linters, to ensure that no known vulnerabilities are released to production.