Encrypted transport and managed storage
Arbor is served over HTTPS. Production data lives in managed providers with encrypted storage and operational access controls.
Arbor is a young security company, so this page separates what is implemented today from what is provider-backed and what is still on the compliance roadmap. No fake badges, no invented audits, no mystery subprocessors.
Concrete controls in the running product and infrastructure stack.
Arbor is served over HTTPS. Production data lives in managed providers with encrypted storage and operational access controls.
Webhook payloads are verified before they enter the analysis pipeline. Unverified deliveries are rejected.
GitHub API access is performed with installation-scoped tokens. Arbor does not intentionally reuse tokens across tenants.
The analyzer parses repository code structurally. It does not run customer tests, execute application code, or evaluate scripts.
User-controlled repository settings are sanitized in the Next.js API proxy before being forwarded to the Rust API.
Rust API data access uses parameter binding through sqlx. Dynamic SQL string assembly is not used for application queries.
The key operating principle: store product evidence, not customer source code snapshots.
Login, user id, avatar URL, installation identity, and repository metadata needed to operate the GitHub App.
Verdicts, call-path evidence, risk summaries, PR identifiers, timestamps, and status/comment URLs.
Repos are cloned for analysis work and should be treated as ephemeral worker data, not product data.
Card entry and payment processing are handled by Stripe. Arbor stores billing state, not raw card numbers.
These vendors may process customer data when Arbor Cloud is used.
GitHub terms and security programManaged platform controlsManaged platform controlsPCI DSS Level 1PII scrubbing configured in application codeThese are roadmap items until an external audit, signed agreement, or launched program exists.
Not certified yet. Controls and evidence capture are being prepared before any audit claim is made.
Data deletion and processor paperwork should be handled case by case until formal workflows ship.
Architecture overview, subprocessors, data flow, and security questionnaire answers are available on request.
Responsible disclosure is active. A paid bounty is not launched yet.
Email security@getarbor.dev with reproduction steps. We acknowledge reports, triage them, and coordinate disclosure with researchers who act in good faith.