Security
Your code is ephemeral. Our architecture guarantees it.
Reviewing private code requires an explicit data-handling promise, not a paragraph in a terms-of-service PDF. Below is exactly what touches our servers, exactly how long it stays, and exactly which compliance work is real versus aspirational.
No storage. No training. No exceptions.
- →
GitHub PR
Source of truth
- →
Sigilix API
TLS termination
- →
Review worker
Memory only · ≤ 60s
- →
LLM provider
Zero retention
/dev/null
Discarded
Where your data goes — and where it stops.
| Actor | Data seen | Retention |
|---|---|---|
| Sigilix worker | Diff hunks, file context, PR metadata | In memory only · purged ≤ 60s after review |
| Sigilix telemetry | Aggregate counters: review count, latency, model errors | 90 days · no file content |
| LLM providers (DeepSeek, Kimi) | Diff hunks + retrieval context for the active specialist | Zero-retention via commercial inference contracts; never used for training |
| Your GitHub | The full review (verdict, findings, suggested patches) | Persistent — owned by you, auditable in the PR |
Least privilege. No write scopes by default.
Read access to pull requests
To fetch the diff and post inline comments.
Read access to repository contents
For limited retrieval of the surrounding files cited in a review.
Read access to org members
So Core can attribute reviews to authors and respect org-level rules.
Write access to pull request reviews
To post the verdict and inline findings as a single review.
Write access to repository contents
We never write to your files. Not used; never requested.
Admin: org
Never used. Sigilix has no need to modify org settings.
Webhook creation
Sigilix runs as a GitHub App with delivery via the App webhook — no per-repo webhook creation.
Honest status. No badges we haven't earned.
- Security architecture reviewCompleted
Internal review by an external advisor. Hardened secret handling, ephemeral inference, and request-level isolation.
- SOC 2 Type IIIn progress
In progress with a Big-Four-adjacent firm. Target audit window: Q4 2026. Bridge letter available on request.
- Annual penetration testIn progress
Scoped to the Sigilix worker, GitHub App, and dashboard. Engagement booked for Q3 2026.
- Bug bounty programPlanned
Postponed until post Series-A. We won't run a bounty we can't triage in 24h. Email security@arcanchor.com for responsible disclosure today.
- HIPAA / FedRAMP / SOC 2 Type II refreshPlanned
Driven by enterprise customer requirements. We pursue certifications when a paying customer needs them, not before.
Read the architecture. Then read the proof.
Sigilix is built on the assumption that customers should never have to take security claims on faith.