Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Description
of Processes for Assessing, Identifying, and Managing Cybersecurity Risks
In the normal course of business, we may collect and store certain sensitive company information, including proprietary and confidential business information, trade secrets, intellectual property, sensitive third-party information and employee information. Our access control policies are based on the principle of least privilege, limiting user access strictly to what is required for their roles. Additionally, we have general measures to identify potential threat actors, including the implementation of two-step verification processes to confirm the identity of all counterparties. Impact of Risks from Cybersecurity Threats
As of the date hereof, the Company and our service providers have not experienced cybersecurity incidents, and we are not aware of any previous cybersecurity threats that have materially affected or are reasonably likely to materially affect the Company. However, we acknowledge that cybersecurity threats are continually evolving, and the possibility of future cybersecurity incidents remains. our security measures cannot guarantee that a significant cyberattack will not occur. A successful attack on our information technology systems could have significant consequences to our business. These measures cannot provide absolute security. No security measure is infallible. See “Risk Factors - Unauthorized disclosure, destruction or modification of data, including personal information, through cybersecurity breaches, computer viruses or otherwise or disruption of our services could expose us to liability, protracted and costly litigation and damage our reputation.” for additional information about the risks to our business associated with a breach or compromise to our systems. |
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | In the normal course of business, we may collect and store certain sensitive company information, including proprietary and confidential business information, trade secrets, intellectual property, sensitive third-party information and employee information. Our access control policies are based on the principle of least privilege, limiting user access strictly to what is required for their roles. Additionally, we have general measures to identify potential threat actors, including the implementation of two-step verification processes to confirm the identity of all counterparties. |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | As of the date hereof, the Company and our service providers have not experienced cybersecurity incidents, and we are not aware of any previous cybersecurity threats that have materially affected or are reasonably likely to materially affect the Company. |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Board
of Directors’ Oversight and Management’s Role
Our Board is ultimately responsible for overseeing cybersecurity, information security, and information technology risks, as well as management’s actions to identify, assess, mitigate, and remediate those risks. On an annual basis, the Board reviews and discusses with management the Company’s policies, procedures and practices with respect to cybersecurity, information security and information and operational technology, including related risks. In addition, our director Dr. Yuanyuan Huang regularly briefed senior management and the Board of Directors on cybersecurity issues as part of our overall enterprise risk management program, which may include information regarding our exposure to privacy and cybersecurity risks deemed to have a moderate or higher business impact, even if immaterial during 2025 and 2024, to us. Dr. Yuanyuan Huang was responsible for implementing cybersecurity policies, programs, procedures, and strategies. Dr. Huang is experienced and qualified because of his education and working experience in related fields. He resigned on February 3, 2026 and on February 18, 2026, the Board of Directors of the Company appointed Jennifer L. O’Shea as directory and secretary. |
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our Board is ultimately responsible for overseeing cybersecurity, information security, and information technology risks, as well as management’s actions to identify, assess, mitigate, and remediate those risks. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | On an annual basis, the Board reviews and discusses with management the Company’s policies, procedures and practices with respect to cybersecurity, information security and information and operational technology, including related risks. |
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Dr. Yuanyuan Huang was responsible for implementing cybersecurity policies, programs, procedures, and strategies. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Dr. Huang is experienced and qualified because of his education and working experience in related fields. |
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |