v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jan. 31, 2026
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Our ability to effectively manage our business, coordinate the production, distribution and sale of our products and ensure the timely and accurate recording and disclosure of financial information depends significantly on the reliability and capacity of our information technology systems. While we have taken what we believe are appropriate precautions to protect our systems, and to date, we have not experienced any material adverse events related to a security breach or cyber-attack, the failure of these systems to operate effectively, the failure of our personnel to follow established procedures, problems with transitioning to upgraded or replacement systems, or a breach in security of these systems through a cyber-attack or otherwise could cause delays and/or interruptions in plant operations, product sales, reduced efficiency of our operations and delays in reporting our financial results.

As part of our routine and periodic overall risk management system or processes, we have incorporated various processes related to cybersecurity. Key cybersecurity controls, such as access controls, are included within our internal control framework that we assess annually as part of Management’s Annual Report on Internal Control Over Financial Reporting. Additionally, periodic discussions are held with outsourced IT professionals for both corporate and consolidated plant environments to determine if appropriate actions are being taken to address potential risks. Through the assistance of our qualified third-party IT professionals, we have implemented numerous security measures, including, but not limited to, multi-factor authentication on critical systems, password requirements, access controls, and data encryption. Our IT policies and procedures include the expectations of all employees and all third parties who may be given access to our IT systems to maintain the security of our IT systems.

Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] While we have taken what we believe are appropriate precautions to protect our systems, and to date, we have not experienced any material adverse events related to a security breach or cyber-attack, the failure of these systems to operate effectively, the failure of our personnel to follow established procedures, problems with transitioning to upgraded or replacement systems, or a breach in security of these systems through a cyber-attack or otherwise could cause delays and/or interruptions in plant operations, product sales, reduced efficiency of our operations and delays in reporting our financial results.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Management Processes Integrated [Text Block] As part of our routine and periodic overall risk management system or processes, we have incorporated various processes related to cybersecurity.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Role of Management [Text Block] Our commitment to the overall security of our information technology systems starts at the highest levels of our Company, the Board of Directors and management.
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee is provided with regular updates by management regarding the control framework and whether any significant deficiencies or material weaknesses exist in the IT control environment.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our commitment to the overall security of our information technology systems starts at the highest levels of our Company, the Board of Directors and management. Management and the Board of Directors provide oversight surrounding cybersecurity. Management oversees internal controls and the company-wide risk assessment process.
Cybersecurity Risk Board of Directors Oversight [Text Block]

Our commitment to the overall security of our information technology systems starts at the highest levels of our Company, the Board of Directors and management. Management and the Board of Directors provide oversight surrounding cybersecurity. Management oversees internal controls and the company-wide risk assessment process. The Audit Committee is provided with regular updates by management regarding the control framework and whether any significant deficiencies or material weaknesses exist in the IT control environment. The Audit Committee is also tasked with determining the appropriate response to any submissions through the corporate whistleblower policy. The whistleblower policy includes the opportunity for employees of the Company to notify the Audit Committee confidentially and anonymously of any concerns regarding cybersecurity, in addition to any accounting, internal accounting controls or auditing matters. The audit committee will report any significant matters to the Board of Directors.

As of January 31, 2026, we had not identified an indication of a cybersecurity incident that would have a material impact on our business and consolidated financial statements.

Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee is also tasked with determining the appropriate response to any submissions through the corporate whistleblower policy. The whistleblower policy includes the opportunity for employees of the Company to notify the Audit Committee confidentially and anonymously of any concerns regarding cybersecurity, in addition to any accounting, internal accounting controls or auditing matters. The audit committee will report any significant matters to the Board of Directors.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Management oversees internal controls and the company-wide risk assessment process.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The audit committee will report any significant matters to the Board of Directors.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true