Security

Last updated: April 20, 2026

MailSink handles email traffic for real test suites and agent runs. That's sensitive by default — an inbox may catch a signup OTP, a password reset link, or content you'd rather not leak. This page documents what we do about that.

Transport

Storage

Authentication

Access model

Subprocessors

We share data with the following third parties only as required:

Responsible disclosure

If you find a vulnerability, please email security@mailsink.dev before sharing details publicly. We'll acknowledge within 72 hours and work with you on a fix timeline.

Please don't run active exploitation against production (automated scanners are fine against your own inboxes; denial-of-service probes are not). We don't currently run a paid bounty program, but we'll credit reporters in the changelog unless you'd rather stay anonymous.

What we don't claim

Contact

General security questions: security@mailsink.dev.