Security

Hyaline is designed with security and privacy as core principles.

Deployment Models

Hyaline can be used in two ways:

  1. GitHub App: The Hyaline GitHub App automates most of the setup and running of Hyaline.
  2. From Scratch: The from scratch model allows you to fully customize your usage of Hyaline.

Each model has different security considerations outlined below.

GitHub App Model

Data Privacy

When using the hosted Hyaline GitHub App, our service receives GitHub webhook payloads for pull request events. These payloads contain code diffs and metadata as documented in GitHub’s webhook payload reference. The GitHub App ignores and does not process the code content in these payloads. It only uses the webhook events to trigger workflows in your hyaline-github-app-configuration repository.

All workflows, configuration, and data processing happen in your own GitHub repository (hyaline-github-app-config). You maintain full control over your configuration and extracted documentation data.

You can optionally host your own copy of the GitHub App to prevent any data from being sent to our servers.

Operation Environment

The GitHub App triggers workflows that run in your GitHub Actions environment:

Network Communications

Network requests are made by GitHub Actions workflows in your repository to:

Authentication & Secrets

Authentication is managed through GitHub repository secrets:

See: How To: Install the GitHub App to learn more about the specific permissions the GitHub App requires.

All secrets are stored in your GitHub repository’s secret management system and never exposed in logs or artifacts.

When working with remote repositories, Hyaline supports either ssh key or http authentication.

From Scratch Model

Data Privacy

When using Hyaline from scratch, Hyaline runs entirely on your infrastructure, whether that’s your local machine, CI environment, or your own servers. Your source code and documentation never leave your control. Hyaline does not send usage analytics, telemetry, or any other data to external servers. We have no visibility into how you use the tool or what content you’re processing.

Operation Environment

Hyaline operates as a standalone CLI tool that:

Network Communications

Hyaline only makes network requests when you explicitly configure it to:

All connections are made directly from your environment to the configured services - Hyaline does not proxy or intercept this traffic.

File System Access

Hyaline requires:

The tool respects standard file system permissions and only accesses files within the paths you configure.

Authentication & Secrets

When working with remote repositories or LLM APIs, Hyaline supports:

Best practice: Store all sensitive credentials as environment variables rather than hard-coding them in configuration files.

MCP Server

The MCP server runs locally and provides your documentation to AI tools. Currently:

Reporting Security Issues

If you discover a security vulnerability in Hyaline, please report it to us at:

Email: [email protected]

We take security issues seriously and will respond promptly to any reports.