Security

PromptDeploy is designed with security as a core principle. Your prompt content never touches our servers — it flows directly between GitHub and the browser.

Key principles

No prompt content stored

PromptDeploy never stores, caches, or logs the content of your prompt files. When you open a prompt in the editor, the content is fetched from GitHub and sent to your browser. When you save, changes are written directly back to GitHub.

Our database stores only metadata: file paths, display names, configuration, and edit logs.

GitHub App authentication

We use a GitHub App (not personal access tokens) with the minimum permissions required:

  • Repository contents (read & write) — to read and update prompt files
  • Pull requests (read & write) — to create PRs for review-mode deploys
  • Metadata (read) — to list repositories

Installation tokens are short-lived and auto-refresh. They're scoped to the specific repositories you've granted access to.

SHA-based conflict detection

Every time you open a file for editing, PromptDeploy records the file's SHA hash. When you save, we verify the SHA hasn't changed. If someone else has modified the file in the meantime, you'll see a conflict warning instead of silently overwriting their changes.

Role-based access control

Three roles (admin, developer, editor) control what each team member can do. Permissions are enforced on every action — see Roles & Permissions.

API key security

API keys are stored as SHA-256 hashes, never in plain text. The full key is shown only once at creation time. Keys can be revoked instantly, and each request updates a last_used_at timestamp for auditing.

More detail

See Data Handling for specifics on what data we store and how.