Security
Security Overview
How we protect your data
Security Overview
BambooSnow is built with security at its core. This document outlines our security practices and how we protect your code and data.
Our Security Principles
- Minimal Access - We only request the permissions we need
- Encryption Everywhere - All data is encrypted in transit and at rest
- Zero Trust - We verify every request, regardless of source
- Transparency - We're open about our security practices
Infrastructure Security
Cloud Infrastructure
BambooSnow runs on enterprise-grade cloud infrastructure:
- AWS (Primary) - US East and EU West regions
- Multi-region deployment - For redundancy and low latency
- Private networking - Services communicate over private networks
Network Security
- All traffic encrypted with TLS 1.3
- Web Application Firewall (WAF) protection
- DDoS mitigation
- Rate limiting on all endpoints
- IP allowlisting available for Enterprise
Code Security
How We Handle Your Code
- Temporary Processing - Code is fetched on-demand for analysis
- No Storage - We don't store your source code
- Isolated Execution - Each analysis runs in an isolated container
- Automatic Cleanup - All temporary data is deleted after processing
What We Analyze
When agents run, they analyze:
- Changed files in pull requests
- Repository structure (for context)
- Dependency manifests
- Configuration files
What We Don't Access
- Your full repository history
- Other branches (unless specified)
- Files outside the analysis scope
- Secrets and credentials (these are filtered)
Authentication & Authorization
User Authentication
- GitHub OAuth integration
- Session management with secure cookies
- Multi-factor authentication support
- Session timeout after inactivity
API Authentication
- Secure API key generation
- Scoped permissions
- Key rotation support
- Usage logging and monitoring
Secret Management
Your Secrets
Environment variables and secrets you provide:
- Encrypted at rest using AES-256
- Never logged or displayed
- Accessible only during agent execution
- Can be rotated at any time
Our Secrets
BambooSnow's own credentials:
- Stored in AWS Secrets Manager
- Rotated automatically
- Audited access logs
- Principle of least privilege
Vulnerability Management
Security Scanning
We continuously scan for vulnerabilities:
- Weekly dependency audits
- Monthly penetration testing
- Continuous SAST/DAST scanning
- Bug bounty program
Incident Response
Our incident response process:
- Detection and triage
- Containment
- Investigation
- Remediation
- Post-incident review
- Customer notification (if applicable)
Reporting Security Issues
Found a vulnerability? Contact us:
- Email: security@bamboosnow.com
- Response within 24 hours
- Bug bounty rewards available
Security Features for You
Repository Security
- Connection verification
- Webhook signature validation
- Access logging
- Anomaly detection
Agent Security
- Sandboxed execution
- Resource limits
- Network isolation
- Output sanitization
Audit Logging
We log security-relevant events:
- Authentication attempts
- Permission changes
- Agent deployments
- Data access
Access your audit logs: Settings > Security > Audit Log
Certifications & Compliance
- SOC 2 Type II (in progress)
- GDPR compliant
- CCPA compliant
- GitHub Security Partner