Skip to Content
🏆 1st Place on Product Hunt! Check it out →
DocumentationSecurity

Security and Data Privacy

Warestack keeps your codebase safe by monitoring operations—not touching source code or running scripts.
We never commit, inject, or modify your repositories.

Monitoring Operations

Warestack focuses exclusively on operational metadata:

  • Pull request events
  • Issue updates
  • Workflow runs
  • Deployment events

We never touch your codebase. We monitor activity around your code to help enforce governance policies and improve visibility.

Storage for Reporting

Warestack uses its own secure, persistent storage to temporarily retain selected metadata:

  • Violations triggered by rules
  • Enforcement actions
  • Rule evaluations and decision logs

This is done only for audit trails and reporting purposes, helping you generate rich compliance and productivity reports.
You can delete this data or configure retention limits at any time.

Customize your Monitoring

You can customize:

  • Which repositories Warestack connects to
  • Which event types (PRs, workflows, etc.) are monitored
  • What rules to enforce and how

We simply watch. You define the rules. We help enforce them—transparently and securely.

Last updated on

Warestack

About

Our story

© 2024, Warestack