Security Policy Report vulnerabilities privately. Security scope includes: • Kernel isolation • K/Q/Φ boundaries • Cryptographic integrity • Domain virtualization guarantees