Security Whitepaper

Your code never
touches our servers

DocsCanary processes raw diffs in memory and immediately purges them. We store only the semantic insight — never the code itself. You control exactly what we see.

AES-256-GCM
SOC 2 Type II In Progress
GDPR Compliant
Full Audit Trail
Our promise

Three unbreakable principles

Security is not a feature we bolted on. It is the foundation every line of DocsCanary is built upon.

We never store your code

Raw diffs are held in memory for seconds during analysis, then permanently purged. No disk writes, no caching, no traces. Our architecture makes it impossible for code to persist.

You control the access level

Choose from three granularity tiers: metadata only, diff only, or contextual diff. Upgrade or downgrade per repository, at any time, with a single toggle.

Every action is auditable

Every API call, every data access, every model invocation is logged with timestamp, actor, and IP address. You can export your full audit trail at any time.

Data lifecycle

How your data flows through DocsCanary

Code enters, insight exits. Nothing else stays. Here is the exact lifecycle of every piece of data we process.

01

PR Webhook

GitHub/GitLab sends a webhook when a PR is merged. We receive metadata only at this stage.

02

In-Memory Analysis

Diffs are fetched into volatile memory, analyzed by AI in seconds. Never written to disk.

03

Insight Stored

Only the semantic result is persisted: which docs are affected, severity, and suggested edits.

04

Code Purged

All raw code data is permanently erased from memory. Zero residual. The only thing that persists is the derived insight.

Code entersIn memory onlyCode purged
Access tiers

You decide what we can see

Every repository has its own access tier. Change it anytime. Downgrade with zero data retention from the previous level.

Metadata Only

Most Restrictive

DocsCanary receives only PR titles, descriptions, commit messages, and file paths. Absolutely zero code access of any kind.

What we see

PR title and description
Commit messages
File paths changed
Branch names and labels

What we never see

Any source code
Diff contents
File contents

Best for: Teams with strict compliance requirements or repos containing highly sensitive IP.

Recommended

Diff Only

Balanced

Only the changed lines from each PR are analyzed. Processed in volatile memory in seconds, never written to disk. Ideal balance of accuracy and privacy.

What we see

Everything in Metadata Only
Added and removed lines only
No surrounding context

Processing guarantee

In-memory only (no disk writes)
Purged within seconds of analysis
Encrypted in transit (TLS 1.3)

Best for: Most teams. Gives DocsCanary enough signal to accurately detect documentation impact without exposing full file contents.

Contextual Diff

Most Accurate

Changed lines plus a configurable window of surrounding context. Enables the highest-fidelity understanding of what changed and why.

What we see

Everything in Diff Only
Surrounding context lines (configurable)
Function/class signatures near changes

Same guarantees

In-memory processing only
Purged immediately after analysis
No code ever stored at rest

Best for: Complex codebases where changes require surrounding context to understand impact on docs accurately.

Infrastructure

Enterprise-grade encryption & infrastructure

Built on AWS with defense-in-depth security at every layer.

Encryption at Rest

  • AES-256-GCM encryption for all persisted data
  • Unique encryption keys per tenant
  • Automatic key rotation via AWS KMS
  • AWS KMS for secure key management

Encryption in Transit

  • TLS 1.3 enforced on all connections
  • HTTPS-only — all HTTP traffic redirected
  • Strict CORS and CSP headers on all endpoints
  • HSTS headers with long max-age directives

Network Isolation

  • AWS VPC with private subnets for all processing
  • No public internet access from processing nodes
  • Network ACLs and security groups at every boundary
  • DDoS mitigation via AWS Shield

AI Processing

  • Anthropic Claude as sole AI provider — with signed DPA
  • No third-party data sharing or model training on your data
  • AI inputs are ephemeral — no logging of prompts or completions
  • Option to use Anthropic's zero-retention API tier
Compliance

Standards we meet and exceed

DocsCanary is built to satisfy the strictest enterprise security and privacy requirements.

SOC 2 Type II

Audit in progress

GDPR

EU data residency options

Audit Trail

Every action logged

Data Deletion

Right to be forgotten

SOC 2 Type II

Our controls are designed to meet SOC 2 Type II requirements across all five trust service criteria: security, availability, processing integrity, confidentiality, and privacy. We are currently undergoing formal third-party audit and are happy to share our controls matrix and architecture documentation under NDA.

GDPR Compliance

We support Data Processing Agreements (DPAs), right to access, right to deletion, and data portability. EU data residency is available on request for teams with regulatory requirements. Sub-processors are disclosed and contractually bound to equivalent data protection standards.

FAQ

Security questions, answered

Does DocsCanary ever store my source code?

No. Raw diffs and code snippets are processed entirely in volatile memory (RAM). They are never written to disk, never cached, and never persisted in any database. Once analysis completes — typically within seconds — all code data is permanently purged from memory.

What data does DocsCanary actually persist?

DocsCanary stores only the semantic insights derived from analysis: which documentation pages may be affected by a code change, the severity of the drift, and AI-generated edit suggestions. We also store metadata you have shared (PR titles, commit messages, etc.) and your configuration preferences.

Is my data used to train AI models?

Absolutely not. We use Anthropic Claude under a Data Processing Agreement that explicitly prohibits training on customer data. We also leverage Anthropic's zero-retention API options, meaning your data is not logged or retained by our AI provider either.

Can I get a copy of my full audit log?

Yes. Every API call, data access event, and model invocation is logged with a timestamp, the acting user, and the originating IP address. You can export your complete audit trail at any time from your account settings, or request it from our team.

Where is my data hosted?

DocsCanary infrastructure runs on AWS with VPC isolation. By default, data is hosted in US regions. For GDPR compliance, we offer EU data residency options where all data processing and storage occurs within EU-based AWS regions.

Do you have a SOC 2 Type II report I can review?

We have implemented all controls required for SOC 2 Type II certification and are currently undergoing our formal audit. We are happy to share our controls matrix, security architecture documentation, and penetration test results under NDA. Contact security@docscanary.com to request access.

Can I request deletion of all my data?

Yes. Under GDPR and our own data governance policies, you can request complete deletion of all your data at any time. This includes all stored insights, metadata, configuration, and audit logs. Deletion is processed within 30 days and is cryptographically verified.

How does DocsCanary handle vulnerability disclosures?

We maintain a responsible disclosure program. Security researchers can report vulnerabilities to security@docscanary.com. We commit to acknowledging reports within 24 hours, providing an initial assessment within 72 hours, and resolving critical issues within 7 days.

Pipeline security

Every step, annotated

From the moment a GitHub webhook fires to the moment results appear in your dashboard — every transition is secured and audited.

01GitHubWebhookTLS 1.3 enforced02DocsCanaryAPIHMAC webhook verify03In-MemoryProcessingno disk writes04AI Analysis→ Resultscode purged afterCode travels in memory only · Never written to disk · Purged after analysisMetadata onlyreceived hereSignature validatedbefore processingVolatile RAM onlyAWS VPC isolatedAnthropic DPAno model training
Encrypted transit

TLS 1.3 on every network hop

Signature verified

HMAC secret on all webhooks

Memory-only

No disk writes ever

Purged after use

Code erased post-analysis

Certifications

Compliance & certifications

Built to satisfy enterprise procurement requirements. Documentation available under NDA.

In progress

SOC 2 Type II

All five trust service criteria: security, availability, processing integrity, confidentiality, and privacy. Formal audit underway — controls matrix available under NDA.

Security controls designed to SOC 2 standards
Third-party pen tests conducted quarterly
Controls matrix shared under NDA on request
Compliant

GDPR

Full GDPR compliance with EU data residency options. We support right to access, right to deletion, and data portability out of the box.

EU data residency available on request
Right to erasure within 30 days
Sub-processors disclosed and contractually bound
Available

Data Processing Agreement

A standard DPA is available for all Business and Team plan customers. Required for GDPR-regulated teams in the EU or those handling personal data.

Standard DPA available for all paid plans
Custom DPA terms negotiable for Enterprise
Covers Anthropic as an AI sub-processor

Specific data protections

Zero code storage

Source code and diffs are never written to disk or persisted in any database.

AES-256-GCM at rest

All persisted insights and metadata are encrypted with unique per-tenant keys.

TLS 1.3 in transit

Every connection is encrypted with modern TLS. HTTP is redirected to HTTPS.

Per-tenant key isolation

Encryption keys are unique per organization, rotated automatically via AWS KMS.

AI data isolation

Anthropic processes data under a signed DPA with zero-retention options available.

Audit trail

Every data access and API call is logged with actor, timestamp, and IP address.

Read-only GitHub access

DocsCanary only requests read permissions on selected repositories — never write.

SSO via SAML/OIDC

Clerk-powered SSO available on Team plan. Enterprise SSO with custom IdP on request.

For procurement teams

Enterprise security FAQ

The questions your security team will ask. Answered precisely.

Do you store our source code?

No. Diffs and code snippets are processed entirely in volatile memory (RAM). They are never written to disk, never cached, and never stored in any database. Once analysis completes — typically within seconds — all code data is permanently purged from memory. The only thing persisted is the derived semantic insight: which doc pages are affected and the suggested edits.

What GitHub permissions do you need?

DocsCanary requests read-only access on the specific repositories you select during setup. We use GitHub's fine-grained repository permissions: contents:read and pull_requests:read. We never request write permissions, webhook management permissions, or org-level access unless you explicitly choose a GitHub App installation that grants it.

Where is data stored?

DocsCanary infrastructure runs on Supabase (backed by AWS), hosted in US-East regions by default. All persisted data is encrypted at rest using AES-256-GCM with per-tenant encryption keys managed via AWS KMS. For GDPR compliance, EU data residency is available — all data processing and storage occurs within EU-based AWS regions upon request.

Can we restrict which repositories you access?

Yes. Repository selection is per-repo and fully granular. During the GitHub App installation flow, you choose exactly which repositories DocsCanary can access — you can start with one and add more at any time. You can also revoke access for individual repos from your GitHub settings at any time without affecting your other connected repos.

Do you support SSO?

Yes. Authentication is powered by Clerk, which supports SAML 2.0 and OIDC-based SSO. SSO is available on the Team plan and above. Enterprise customers can configure a custom identity provider (Okta, Azure AD, Google Workspace, etc.). SCIM provisioning for automated user lifecycle management is available on Enterprise.

Is our data used to train AI models?

No. We use Anthropic Claude under a Data Processing Agreement that explicitly prohibits training on customer data. We also use Anthropic's zero-retention API options, meaning your data is not logged or retained by our AI provider either. Your code never contributes to model improvements.

Can we get a penetration test report?

Yes, under NDA. We conduct third-party penetration tests quarterly and are happy to share the most recent report with enterprise prospects and customers. Contact hello@docscanary.com to request access. We also welcome coordinated security research — see our responsible disclosure policy.

What happens to our data if we cancel?

Upon cancellation, your account data is soft-deleted immediately (no longer accessible via the product) and hard-deleted within 30 days. This covers all stored insights, metadata, configuration, audit logs, and any associated backups. We will provide a written confirmation of deletion upon request.

Security review

Need a formal security review?

Our security team will walk through our architecture, share documentation under NDA, and answer any questions from your procurement or InfoSec team.

  • Architecture walkthrough call (30 min)
  • Controls matrix and pen test report under NDA
  • Custom DPA review for Enterprise
  • Respond within one business day
Your security is our priority

Have security questions? We are here.

Our security team is available to discuss your requirements, share documentation under NDA, or walk through our architecture in detail.

security@docscanary.com — PGP key available on request

Security | DocsCanary