Log in

Security at Tuist

At Tuist, we are deeply committed to ensuring the security of our tools and services. We understand that trust is fundamental, especially when it comes to tools that developers rely on to build high-quality software. This page outlines our security practices, how to report vulnerabilities, and the steps we take to safeguard our users and their projects.

Security Practices

Infrastructure Security

Tuist operates on secure cloud infrastructure designed to ensure high availability and protection against threats. Our infrastructure security measures include:

Application Security

Incident Response

Tuist has a robust incident response process to handle security incidents efficiently. Our process includes identifying the issue, mitigating risks, and communicating with affected users transparently.

Data Protection

Reporting Vulnerabilities

If you discover a security vulnerability, we encourage you to report it to us responsibly. Here’s how to proceed:

  1. Email: Contact us at [email protected].
  2. Details: Provide a detailed description of the issue, including reproduction steps, screenshots, and relevant logs if applicable.

We prioritize all security reports and work diligently to address them. Public acknowledgment is available for those who help secure Tuist, upon request.

Responsible Disclosure Policy

We ask security researchers to:

Bug Bounty Program

Tuist is working on introducing a bug bounty program to reward security researchers for identifying vulnerabilities. Stay tuned for updates on this initiative.

Future Enhancements

Security is an ongoing priority at Tuist. We are committed to improving our security posture through:

Contact Us

For general security inquiries, please email [email protected]. We appreciate your contributions to maintaining a secure environment for our users.

We use cookies

This site uses cookies. By continuing to use our site, you agree to use of cookies.