Security and Data Privacy
Warestack keeps your codebase safe by monitoring operations—not touching source code or running scripts.
We never commit, inject, or modify your repositories.
Monitoring Operations
Warestack focuses exclusively on operational metadata:
- Pull request events
- Issue updates
- Workflow runs
- Deployment events
We never touch your codebase. We monitor activity around your code to help enforce governance policies and improve visibility.
Storage for Reporting
Warestack uses its own secure, persistent storage to temporarily retain selected metadata:
- Violations triggered by rules
- Enforcement actions
- Rule evaluations and decision logs
This is done only for audit trails and reporting purposes, helping you generate rich compliance and productivity reports.
You can delete this data or configure retention limits at any time.
Customize your Monitoring
You can customize:
- Which repositories Warestack connects to
- Which event types (PRs, workflows, etc.) are monitored
- What rules to enforce and how
We simply watch. You define the rules. We help enforce them—transparently and securely.