Security
Security at R6
We build security tools. We hold ourselves to the same standard.
Infrastructure Security
- —All web traffic is encrypted with TLS 1.3 and HSTS preloading is enabled
- —Website is deployed on Cloudflare Workers with DDoS protection
- —No third-party analytics, tracking scripts, or advertising pixels
- —Security headers enforced: HSTS, X-Content-Type-Options, X-Frame-Options, Referrer-Policy, Permissions-Policy
Code Security
- —Phoenix Core is open source — inspect the code yourself on GitHub
- —Dependencies are monitored for known vulnerabilities
- —All code changes go through review before deployment
Product Security
- —Phoenix operates as a Kubernetes Operator with RBAC-scoped permissions
- —Zero-agent architecture — no sidecars, no code injection, no instrumentation
- —All telemetry stays within your cluster — no data is sent to R6 Security
Vulnerability Disclosure
If you discover a security vulnerability in Phoenix or any R6 Security product, please report it responsibly to security@r6security.com. We take all reports seriously and will respond within 48 hours.