Trust and Safety

Report abuse clearly and quickly.

Use this page to report malware, phishing, illegal content, policy abuse, or suspicious sharing behavior. Reports enter moderation and containment workflows designed to reduce further exposure.

Workflow
Moderation review, containment, and security logging
Best input
Share token, alias, or link plus a short factual description

Submit abuse report

Fields marked optional can be left blank
1. Report category

Choose the closest category so the report can be triaged quickly.

2. Context and identification

Token, alias, or share link details help route this report to the correct item and speed up review.

3. Report details

What did you see? Why does it seem suspicious or harmful? When did it happen? Did you click or download anything?

4. Contact for follow-up (optional)

You can submit anonymously. Sharing an email may help if moderation needs clarification.

What happens next

  • Report enters moderation review.
  • Suspicious or risky items may be quarantined or blocked.
  • Security events are logged for operational follow-up.

Submit reports in good faith. Deliberately false reports may result in access restrictions. By submitting, you agree to the acceptable use policy.

Submit report

Report urgent abuse now. Include as much context as you can for faster review.

What you can report
  • Malware or suspicious file behavior
  • Phishing or impersonation attempts
  • Illegal or prohibited content
  • Policy abuse or suspicious sharing patterns
Before you submit

Include the link, token, or alias when possible and describe exactly what you observed.