← Back to home

Security

Security approach

Sikoshi is built for authorized network operations in real environments. We take a practical security-first approach focused on controlled access, operator visibility, responsible deployment, and minimizing unnecessary exposure.

Authorized use only

Sikoshi is intended only for use by authorized operators acting with permission to access the relevant systems, credentials, devices, and environments. Customers are responsible for ensuring they have appropriate authority and internal approval to use the product in their networks.

Customer-controlled environments

Customers remain responsible for their own infrastructure, credentials, change windows, approval processes, and deployment decisions. Sikoshi is designed to support network operations, not to replace customer responsibility for environment security, change control, or access governance.

Sensitive environments

Sikoshi is intended to support network operations, not to collect sensitive customer records, patient data, payment data, or other regulated business content. Customers operating in healthcare, finance, government, or other regulated environments should evaluate Sikoshi under their own security, compliance, procurement, and change-control requirements before production use.

Credentials and access

Access to network environments should be limited to authorized personnel and handled using the customer’s own operational and security policies. Customers should protect credentials, restrict administrative access appropriately, and review permissions on an ongoing basis.

Deployment responsibility

Network changes can affect availability, behavior, and business operations if used improperly. Customers should review generated output, validate fit for the target environment, and use appropriate operational judgment before applying changes in production.

Security reporting

If you believe you have identified a security issue related to the Sikoshi website or service, please report it to us with as much relevant detail as possible.

Security contact

info@sikoshi.com

Please include the issue summary, affected page or workflow, steps to reproduce if available, and any supporting detail that helps us investigate responsibly.

No public bug bounty

Sikoshi does not currently operate a public bug bounty program or pre-authorize testing against its systems. Please do not conduct intrusive testing, service disruption, social engineering, or unauthorized access attempts.

Ongoing improvement

Security is an ongoing process. We expect our operational and technical controls to evolve as the product, customer base, and deployment model mature.