Prelint processes code diffs and product specs to review your PRs. Each organization runs on isolated infrastructure — separate containers, separate storage. We never train on your data. Here is exactly how.
TYPICAL AI TOOLS
PRELINT
Each organization gets its own isolated containers and dedicated storage namespace. Your code is never shared with another tenant. All data encrypted at rest.
Contractual zero-retention with all LLM providers. Prompts discarded after each response.
TLS 1.3 in transit. AES-256 at rest. Per-tenant keys.
Read access to pull requests and contents. Write access to review comments and labels. No admin access. No org-level permissions.
GitHub sends a webhook with diff metadata. Prelint reads the diff via GitHub API.
Diffs and specs scanned for secrets and PII before analysis. Content exclusions applied via .prelintignore.
Diff and relevant specs sent to LLM with zero-retention agreement. Per-request encryption. Prompt discarded after response.
Prelint posts review comments on the PR via GitHub API. Labels applied.
Each organization's code and data lives in an isolated storage namespace, encrypted at rest. Never shared with another tenant. Only review metadata retained for audit logs.
Code is stored in isolated, per-organization containers with dedicated storage. Each organization runs on tenant-isolated infrastructure — your data is never shared with another tenant and is encrypted at rest.
We use providers with contractual zero-retention agreements. Your code is never stored or used for training by any model provider.
Read access to pull requests and repository contents. Write access to post review comments and labels. No admin access required.
Yes. Add a .prelintignore file to your repository or configure org-level exclusion rules. Changes are audit-logged.
Enterprise plans include options for dedicated infrastructure and data residency requirements. Contact us for details.
We are pursuing SOC 2 Type II certification. Security questionnaire available on request.
We are happy to walk through our security architecture, answer your questionnaire, or discuss your specific compliance needs.
Security questionnaire available on request