Security
How hall-monitor handles your data and what we're building toward.
Data handling
- hall-monitor processes webhook payloads from GitHub and events from Slack. It stores event metadata (PR titles, commit SHAs, deployment IDs, timestamps) to maintain thread state.
- Source code is never read, stored, or transmitted. Webhook payloads contain metadata only — diffs and file contents are not included in the events hall-monitor receives.
- No personal data is collected beyond what's present in webhook payloads (Git author names, GitHub usernames).
Authentication and access
- GitHub webhooks are validated using HMAC-SHA256 with a per-installation secret. Invalid or missing signatures are rejected immediately.
- Slack events are verified using Slack's signing secret. The bot uses the minimum required OAuth scopes: chat:write, chat:write.public, reactions:read, and channels:history.
- API keys are scoped per workspace and can be rotated from the dashboard at any time.
Infrastructure
- Each workspace's data is logically separated at the database level via tenant isolation.
- All data in transit is encrypted via TLS.
Vulnerability reporting
- Responsible disclosure: security issues can be reported to security@hall-monitor.dev. We aim to acknowledge within 48 hours.
Security roadmap
We're actively working toward these. They're planned, not yet in place.
- Encryption at rest (AES-256) for all stored data
- SSO / SAML support for dashboard access (Okta, Azure AD, Google Workspace)
- SOC 2 Type II audit
- GDPR-compliant data processing with Data Processing Agreements (DPAs)
- Configurable event data retention periods
- Automated dependency vulnerability scanning in CI
- Regular third-party penetration testing
- Automated database backups with defined RPO/RTO targets
Questions about security?
Reach out if you need details on our security posture or have specific requirements.
Contact us