What to include
Send the affected URL, account or workspace identifier, reproduction steps, expected impact, screenshots or logs when safe, and whether the issue is actively exploitable.
Security
Report vulnerabilities, account compromise, suspicious access, or sensitive data exposure through the security inbox. Please do not publish details before we have had time to investigate and respond.
Send the affected URL, account or workspace identifier, reproduction steps, expected impact, screenshots or logs when safe, and whether the issue is actively exploitable.
Security reports are owned by Glink Product Engineering with escalation to the platform owner. Urgent reports receive first triage within 24 hours; non-urgent reports receive first response within 1 business day.
Do not include passwords, API keys, private tokens, or customer data in plain text. If evidence is necessary, describe the artifact and we will arrange a safer transfer path.
For suspected account takeover, billing abuse, or unwanted lifecycle sends tied to abuse, support can apply support-block or manual-suppression until the case is reviewed.
These contacts are the public routing contract for Glink support, trust, billing, and security requests.