v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] We are a special purpose acquisition company with no business operations and therefore, prior to the completion of a business combination, do not have any operations of our own that face cybersecurity threats. Since our initial public offering, our sole business activity has been identifying and evaluating suitable targets for a business combination. Therefore, the Company does not consider that it faces significant cybersecurity risk and has not adopted any cybersecurity risk management program or formal processes for assessing, identifying, and managing material risks from cybersecurity threats. Our board of directors is ultimately responsible for overseeing the Company’s risk management activities in general and will be informed, promptly and as deemed necessary by our management team, of any cybersecurity threats or risks that may arise, cyber incidents and industry trends, including regarding the appropriate disclosure, mitigation, or other response or actions that our board deems appropriate to take. As of the date of this Annual Report, the Company did not identify any risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect the Company, including its business strategy and results of operations. However, any such attack could adversely affect our business. We depend on the digital technologies of third parties and any sophisticated and deliberate attacks on, or security breaches in, systems or infrastructure or the cloud that we utilize, including those of third parties, could lead to corruption or misappropriation of our assets, proprietary information and sensitive or confidential data. Because of our reliance on the technologies of third parties, we also depend upon the personnel and the processes of third parties to protect against cybersecurity threats, and we have no personnel or processes of our own for this purpose. A penetration of our systems or a third-party’s systems or other misappropriation or misuse of personal information could subject us to business, regulatory, litigation and reputation risk, which could have a negative effect on our business, financial condition and results of operations.
Cybersecurity Risk Management Processes Integrated [Text Block] Since our initial public offering, our sole business activity has been identifying and evaluating suitable targets for a business combination. Therefore, the Company does not consider that it faces significant cybersecurity risk and has not adopted any cybersecurity risk management program or formal processes for assessing, identifying, and managing material risks from cybersecurity threats.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Since our initial public offering, our sole business activity has been identifying and evaluating suitable targets for a business combination. Therefore, the Company does not consider that it faces significant cybersecurity risk and has not adopted any cybersecurity risk management program or formal processes for assessing, identifying, and managing material risks from cybersecurity threats.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Since our initial public offering, our sole business activity has been identifying and evaluating suitable targets for a business combination. Therefore, the Company does not consider that it faces significant cybersecurity risk and has not adopted any cybersecurity risk management program or formal processes for assessing, identifying, and managing material risks from cybersecurity threats.
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] false
Cybersecurity Risk Management Processes Integrated [Flag] false
Cybersecurity Risk Role of Management [Text Block] Our board of directors is ultimately responsible for overseeing the Company’s risk management activities in general and will be informed, promptly and as deemed necessary by our management team, of any cybersecurity threats or risks that may arise, cyber incidents and industry trends, including regarding the appropriate disclosure, mitigation, or other response or actions that our board deems appropriate to take.
Cybersecurity Risk Board of Directors Oversight [Text Block] Our board of directors is ultimately responsible for overseeing the Company’s risk management activities in general and will be informed, promptly and as deemed necessary by our management team, of any cybersecurity threats or risks that may arise, cyber incidents and industry trends, including regarding the appropriate disclosure, mitigation, or other response or actions that our board deems appropriate to take.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our board of directors is ultimately responsible for overseeing the Company’s risk management activities in general and will be informed, promptly and as deemed necessary by our management team, of any cybersecurity threats or risks that may arise, cyber incidents and industry trends, including regarding the appropriate disclosure, mitigation, or other response or actions that our board deems appropriate to take.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] As of the date of this Annual Report, the Company did not identify any risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect the Company, including its business strategy and results of operations. However, any such attack could adversely affect our business.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Management Positions or Committees Responsible [Flag] false
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Because of our reliance on the technologies of third parties, we also depend upon the personnel and the processes of third parties to protect against cybersecurity threats, and we have no personnel or processes of our own for this purpose.
Cybersecurity Risk Management Third Party Engaged [Flag] true