Our Commitment to Security
At AutoChangelog, we take the security and privacy of your data seriously. We understand that you're trusting us with access to your repositories, and we've built our platform with security as a foundational principle. This document outlines the measures we take to protect your data and maintain your privacy.
Data We Collect
We collect only the minimum data necessary to provide our service. This includes your GitHub username and email address for account management, repository names and IDs to display in your dashboard, and the SHA of your last documented commit to track changelog generation progress. We also store the changelog entries you create and any customizations you make to your changelog templates.
We do not store your source code, full commit history, pull request content, or file contents. When generating a changelog, we fetch data from GitHub's API in real-time, process it through our AI, and then discard the raw data immediately after generating your entry.
Data Encryption
All data transmitted between your browser and AutoChangelog is encrypted using TLS 1.2 or higher. We enforce HTTPS on all connections and use HTTP Strict Transport Security (HSTS) to prevent downgrade attacks. Your GitHub OAuth tokens are encrypted at rest in our database using industry-standard encryption algorithms.
Infrastructure Security
AutoChangelog runs on secure cloud servers with regular security patches applied. We use firewalls to restrict network access and automated backups to ensure data recovery in case of incidents.
Application Security
We follow secure development practices to protect against common vulnerabilities. Our application implements protection against cross-site scripting (XSS), cross-site request forgery (CSRF), SQL injection, and other OWASP Top 10 vulnerabilities. We use parameterized queries for all database operations and sanitize all user inputs before processing.
GitHub webhook payloads are verified using HMAC-SHA256 signatures with per-project secrets to ensure authenticity. Rate limiting is implemented across all endpoints to prevent abuse and denial of service attacks.
Regular Security Audits
We conduct regular security assessments of our codebase and infrastructure. This includes automated vulnerability scanning, dependency audits to identify and patch vulnerable libraries, and periodic manual security reviews. We keep all dependencies up to date and monitor security advisories for any components we use.
Access Controls
Access to production systems is limited to those who need it. We use multi-factor authentication for all administrative access and maintain audit logs of system access.
Third-Party Services
We carefully vet all third-party services we use. Our key integrations include GitHub for repository access and authentication, OpenAI for AI-powered changelog generation, and Stripe for payment processing. Each of these services maintains their own rigorous security standards and compliance certifications. We only share the minimum data necessary with each service to perform their function.
Data Retention
We retain your account data and changelog entries for as long as your account is active. If you delete your account, we remove your personal data within 30 days. Changelog entries and associated data are deleted when you remove a repository from AutoChangelog or delete your account. Backups containing deleted data are purged according to our backup retention schedule.
Your Privacy Rights
You have the right to access, correct, or delete your personal data at any time. You can export your changelog data from the dashboard. To request account deletion or a copy of your data, contact us at hello@autochangelog.com. We respond to all data requests within 30 days.
Incident Response
In the unlikely event of a security incident, we have procedures in place to respond quickly and effectively. This includes identifying and containing the incident, assessing the impact, notifying affected users promptly, and implementing measures to prevent recurrence. We are committed to transparency and will communicate openly about any incidents that affect your data.
Compliance
AutoChangelog is designed with privacy regulations in mind. We process data in accordance with applicable privacy laws and give you control over your information. We do not sell your personal data to third parties and only use it to provide and improve our service.
Reporting Security Issues
If you discover a security vulnerability in AutoChangelog, please report it to us at hello@autochangelog.com. We appreciate responsible disclosure and will work with you to understand and address the issue promptly. Please do not publicly disclose security issues until we've had a chance to investigate and release a fix.
Questions
If you have any questions about our security practices or privacy policies, please don't hesitate to reach out at hello@autochangelog.com. We're happy to provide additional details about how we protect your data.