Use this route for suspicious behavior
If the issue appears abusive, compromise-related, or security-sensitive, this is usually the better route than ordinary support.
This page explains how security-sensitive reporting should be handled across PsyData Labs. It is intended for suspicious activity, abuse concerns, trust-related incidents, and other security-sensitive matters that should not be routed like ordinary support requests.
Guide
Use this page for security-sensitive concerns, suspicious activity, abuse signals, and trust-related reporting.
Security-sensitive matters should not usually be handled like ordinary support tickets. This page exists to help route higher-sensitivity concerns into a more appropriate review path.
If your concern involves suspicious behavior, abuse, compromise risk, or another trust-related issue, this route is generally more appropriate than general support.
Security reporting is generally the right path for concerns such as:
| Concern Type | Typical Example | Best Route | Sensitivity |
|---|---|---|---|
| Suspicious Account Activity | You believe an account may be compromised or behaving suspiciously | security@psydata.net | High |
| Abuse / Malicious Behavior | You observe harmful, deceptive, or abusive use of a service or workflow | security@psydata.net | High |
| Security Weakness Concern | You believe there may be a security issue that needs controlled review | security@psydata.net | High |
| Ordinary Product Issue | A normal bug, usability problem, or non-sensitive support question | General or Technical Support instead | Not Security Route |
Not every technical or product problem is a security issue.
The security route is usually not the right path for:
Good security reports are clear, concise, and focused on the concerning behavior.
Helpful security reporting often includes:
Security issues vary in severity. Explain the impact clearly rather than using urgency labels without context.
Severity may be higher when:
Abuse concerns can include deceptive use, misuse of services, suspicious automation, impersonation, unauthorized access attempts, or other behavior that appears harmful or unsafe.
If you are unsure whether a concern rises to the level of security-sensitive reporting, it is usually safer to explain the suspicious behavior clearly and let the report be triaged appropriately.
Security-sensitive reporting should still be handled carefully.
After reading this page, most visitors should do one of the following:
Helpful Notes
These reminders help keep reporting safer and easier to triage.
If the issue appears abusive, compromise-related, or security-sensitive, this is usually the better route than ordinary support.
A short explanation of what you observed and why it is concerning is often the most useful starting point.
Security reporting still should not include unnecessary raw credentials or unsafe sensitive data.
Contact
Use this route for suspicious activity, abuse, and other security-sensitive concerns.
For suspicious activity, abuse concerns, compromise suspicion, and other security-sensitive reporting.
For non-security product issues or general help when the concern is not actually security-sensitive.