XML 25 R11.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] We are a blank check company with no business operations. Since our initial public offering, our sole business activity has been identifying and evaluating suitable acquisition transaction candidates. Therefore, we do not consider that we face significant cybersecurity risk and have not adopted any cybersecurity risk management program or formal processes for assessing cybersecurity risk. We depend on the digital technologies of third parties, and any sophisticated and deliberate attacks on, or security breaches in, systems or infrastructure or the cloud that we utilize, including those of third parties, could lead to corruption or misappropriation of our assets, proprietary information and sensitive or confidential data and could have a material adverse effect on our business, financial condition or reputation. Because of our reliance on the technologies of third parties, we also depend upon the personnel and the processes of third parties to protect against cybersecurity threats, and we have no personnel or processes of our own for this purpose. 

Our board of directors is generally responsible for the oversight of risks from cybersecurity threats, if there is any. Our management will promptly report to the board of directors on incidents of material cybersecurity risks facing us and any third parties and the measures that may be taken to mitigate such risks. In the event of a cybersecurity incident, we intend to follow an incident response plan, which outlines the steps to be followed from incident identification, mitigation, recovery and notification to legal counsel, senior leadership and the board of directors. We have not encountered any cybersecurity incidents since our initial public offering.

 
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our board of directors is generally responsible for the oversight of risks from cybersecurity threats, if there is any. Our management will promptly report to the board of directors on incidents of material cybersecurity risks facing us and any third parties and the measures that may be taken to mitigate such risks. In the event of a cybersecurity incident, we intend to follow an incident response plan, which outlines the steps to be followed from incident identification, mitigation, recovery and notification to legal counsel, senior leadership and the board of directors. We have not encountered any cybersecurity incidents since our initial public offering.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] false