v3.25.3
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jun. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] We depend on software applications, information technology systems, computing infrastructure and cloud service providers to operate our business. These systems are managed, hosted, provided or used by third parties, to assist in conducting our business and which have their own cyber security measures in place. We do not separately implement generally applicable industry standards or best practices processes for the assessment, identification, and management of material risks from cybersecurity threats to our information technology systems. We do not maintain a cyber incident reporting and response process and our information security policies and procedures are not reviewed on a regular basis. 

We have not experienced a cybersecurity incident that resulted in a material adverse impact to our business or operations; however, there can be no guarantee that we will not experience such an incident in the future. If our limited security measures are breached and an unauthorized party obtains access to our proprietary business information, our information systems may be perceived as being unsecure, which could harm our business and reputation, and our proprietary business information could be misappropriated which could have an adverse effect on our business and results of operations. We have not implemented a governance structure and processes to assess, identify, manage, and report cybersecurity risk.

 
Cybersecurity Risk Management Processes Integrated [Flag] false
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false