Zoo.txt
If you are looking to report a security vulnerability or review their safety protocols, here are the key details based on their public disclosures:
Provide more context if you'd like a template for either. Zoo is now SOC 2 compliant zoo.txt
: Zoo maintains a security.txt file that outlines the exact process for security researchers to report vulnerabilities. If you are looking to report a security
: They mandate the use of WebAuthN hardware tokens for all employees to prevent phishing attacks. The text file likely refers to a "security
The text file likely refers to a "security.txt" file or a vulnerability reporting document for Zoo (zoo.dev) , a modern hardware design and infrastructure company.
: They generate and store Software Bill of Materials (SBOMs) for all services to track dependencies and associated risks.
If your report concerns their overall security posture (relevant for SOC 2 or corporate audits), the following measures are in place: