Collect incident reports, vulnerability disclosures, screenshots of suspicious activity, and credentials for compromised accounts through self-destructing channels.
The way most organizations handle this today is a liability.
When an account is compromised, the new password gets shared over chat. That message is now searchable by everyone in the channel.
Employees report security incidents by emailing screenshots. Those screenshots sit in the email system indefinitely, often unencrypted.
External security researchers have no secure way to submit findings. They email details to a shared inbox visible to the whole team.
A single secure channel from request to destruction.
Generates a Secretary Link for the reporter or affected user
Submits credentials, screenshots, logs, or vulnerability details
Views the submission, takes action, submission is destroyed
No credentials lingering in chat, email, or ticketing systems
Concrete examples of Secretary Links in action.
IT generates temporary credentials for a locked-out executive. The credentials are submitted through a Secretary Link and destroyed after viewing.
An employee notices suspicious login activity. IT sends them a link to securely submit screenshots and account details without exposing them.
External researchers submit vulnerability details, proof-of-concept code, and screenshots through an ephemeral collection link.
Every submission is encrypted with its own unique key before storage. Keys are separated from data at the infrastructure level.
Screenshots, log files, configuration dumps. Whatever the incident requires.
Integrate with your ticketing system. Auto-generate collection links when incidents are created.
Separate the link from the passphrase across different channels for defense in depth.
Get early access to Secretary Links. Opening May 1, 2026.