Request UnoLock Client Source Access
UnoLock provides client-side source materials on request for legitimate security review, diligence, and regulatory evaluation.
This page explains what can be requested, what information to include, and how to contact us.
What You Can Request
Depending on the review purpose and scope, Techsologic may provide access to relevant client-side materials such as:
- Client source snapshot for the relevant web release or feature scope.
- Build metadata needed to understand the shipped client version and build context.
- Verification artifacts such as signed manifest references or related production integrity material where appropriate to the request.
- Supporting documentation relevant to the review, including security and architecture material already described in our public technical documentation.
Requests are reviewed case-by-case and scoped to the stated need.
How To Request Access
Send your request to security@unolock.com and include enough detail for us to evaluate the scope quickly.
- Your name, organization, and contact details.
- The reason for the request, such as security review, procurement diligence, or regulatory assessment.
- The product surface you want reviewed, for example the Safe web client, Drop web client, or related client-side components.
- Any relevant timeline, environment, or release/version context.
If you already have a security contact at Techsologic, you may also submit the request through that channel or through the support portal at https://www.unolock.com/support.html.
How Requests Are Handled
- Requests are evaluated for legitimacy, scope, and security sensitivity.
- We may ask follow-up questions to identify the exact client surface or release needed.
- Access may be limited to the materials necessary for the stated review purpose.
- We may provide build or integrity references alongside source materials where that improves reviewability.
Public technical documents remain available for general review, while source access is now managed through a controlled request process.
Production Integrity Controls
UnoLock production clients use signed and hashed release artifacts. These controls are intended to make unauthorized client changes harder to introduce silently.
Where appropriate, source access reviews may include enough integrity context to tie provided source materials to the relevant production release.
Why We Use Request-Based Access
This model lets us support legitimate review and due diligence while avoiding broad public distribution of production-oriented client source packages and related release artifacts.
If you need client-side source access for a concrete review, contact security@unolock.com.