VigilChain
Code-to-cloud risk visibility

Data Flow & AI Processing

Where your data goes, and why.

Plain-language complement to our Privacy Policy. When the two ever appear to conflict, the Privacy Policy is legally binding; this page exists to make the same facts visible without a legal-document reading.

your env → us

Received by VigilChain

Scanner findings (CVE, file path, snippet) · Repo metadata · CI/CD configs · AWS topology metadata · ECR image digests · Tenant repositories cloned into ephemeral workers for scan and analysis jobs

us → Anthropic

Available to AI analysis

Rule identifiers · File paths · Configuration files or snippets · Finding metadata · Relevant source files or excerpts from the cloned repo when needed for classification, narrative, or reachability analysis

not requested

Not requested / redacted

Application secrets · Environment variables · Customer data inside your services · Database contents · DB credentials · Known secret patterns before AI calls, when detected

Required permissions, by integration

IntegrationPermission scopeJustificationWhat we cannot do
GitHub Appcontents:read, metadata:read, checks:read, pull_requests:read on selected reposClone selected repositories into VigilChain workers for transient scan and analysis jobs; read CI status; read PR metadata for owner mappingPush, merge, delete, modify branch protection, install other apps
AWS cross-account IAM roleRead-only on EC2, ECS, ECR, ELB, IAM, CloudWatch, S3 metadata. Trust policy requires our account ID + external-idDiscover topology to map deployment chainCreate, modify, or delete any resource in your AWS account
Scanner outputs (SAST / SCA / cloud posture)Generated by VigilChain workers from cloned repos, dependency and container metadata, and read-only cloud metadataProduce findings for deployment-chain rankingAccess scanner credentials; require you to modify your CI workflow for SAST results
Jira / Linear / GitHub IssuesWrite-scoped to the project you specifyCreate and update tickets for findingsRead other projects, modify project settings, delete tickets you didn't author

Data categories & retention

CategoryStored whereRetained how longEncryption
Source code (transient)Worker checkout + scratch volume during scan and analysis jobDuration of scan or analysis job, then purgedTLS 1.2+ in transit; encrypted scratch volume
Scanner findings (CVE, path, snippet)Tenant DB rowLife of finding (or until you delete it)AES-256 (RDS, KMS)
Asset metadata (repo names, ECR digests, ALB DNS, task defs)Tenant DB rowLife of accountAES-256
Account & user dataTenant DB rowLife of account; deleted within 60 days of closureAES-256
Audit logsTenant DB row7 yearsAES-256
RDS backupsAWS RDS snapshots30 daysAES-256 (KMS)
AI prompts (sent to Anthropic)Anthropic infrastructureUp to 30 days under standard terms (subject to ZDR negotiation)Anthropic-controlled

What is sent to AI, by use case

Rule classification. Rule ID, scanner name, and rule description text. Used to map vendor rules to canonical VC taxonomy.

Dedup confirmation. Rule IDs and metadata for the candidate cluster. Usually only the cluster's metadata, though AI-assisted analysis may inspect related source files from the cloned repository when needed to resolve an ambiguous match.

Repo deployment-chain analysis. CI/CD config files (.github/workflows/*.yml, Dockerfile, infra-as-code like Terraform *.tf). These configuration files may be inspected from the cloned repository to map build, image, and deployment relationships.

Finding narrative + reachability. File path, rule context, and relevant source code from the cloned repository when needed to explain the finding or assess code-path reachability. The amount of context depends on the rule, language, and repository structure.

Reachability today is deployment-chain reachability (deterministic) plus AI-assisted code-path analysis (advisory). Not deterministic call-graph reachability today. Anthropic standard API terms apply today; prompts may be retained up to 30 days for trust-and-safety. ZDR is in negotiation. Per-tenant AI disable is on the roadmap.

What we do not request, and redact when detected

  • Application secrets (env vars, KMS-decrypted material, OAuth credentials).
  • Database contents.
  • Customer-payload data observed in logs.
  • Sensitive configuration values (API keys, DB passwords) — we redact known-secret patterns before any AI call when detected.
  • Service environment variables and runtime customer data. Repository contents are cloned into VigilChain worker infrastructure for analysis; secrets should not be committed to those repositories.

AI controls today vs roadmap

ControlTodayRoadmap
Per-tenant AI disableplanned
ZDR with Anthropicin negotiation
Private model / on-prem inferencenot committed
Snippet-window size cap30 linesconfigurable per tenant
Pre-AI secret redaction

Compliance & legal

The Privacy Policy is the legally binding policy. Our Security page covers responsible disclosure and safe harbor. A DPA is available on request at legal@vigilchain.com.

Changelog

  • April 25, 2026. Initial publication.