How can you trust us
with your data?
The most important question we get asked. This page is the long-form, no-bullshit answer: exactly what data MergeWhy reads, exactly where it lives, exactly which deployment model matches your risk tolerance.
Last updated · April 26, 2026
Exactly what MergeWhy accesses on your GitHub
MergeWhy uses read-only GitHub App scopes. We have no write access to your repositories — we cannot push code, change settings, modify reviews, or merge PRs.
| Data | We read | We store |
|---|---|---|
| PR title, description, author, labels | Yes | Yes |
| Reviews, approvals, comments | Yes | Yes |
| Linked tickets (Jira / Linear / GitHub Issues) | Yes | Yes (refs only) |
| CI check runs, statuses, durations | Yes | Yes |
| File list changed in PR + commit SHAs | Yes | Yes |
| Source code diffs / file contents | On-demand at bundle time | No (not persisted) |
| Repo settings, secrets, or branch protection | No | No |
| Write access to push, merge, or modify | No | No |
Our GitHub App permission manifest is published in the docs. You can audit it before installing.
Architecture & data flow
- Single-tenant logical isolation. Your organization's data is row-level segregated by
organizationIdon every query. No cross-tenant joins exist in our codebase. - Encrypted at rest. PostgreSQL with AES-256 encryption. TLS 1.3 in transit.
- Hosted on AWS (us-east-1). ECS containers, no shell access in production.
- Evidence vault is tamper-evident.Every sealed record is SHA-256 hashed and Ed25519 signed. Modifying a single byte after seal time breaks the signature — even MergeWhy can't silently alter your evidence.
- Audit logs for every action. Every read, write, and admin operation on your data is logged immutably. We can produce a full access trail on request.
Three deployment models
Pick the one that matches your risk tolerance. They all use the same product — only the trust boundary changes.
SaaS
- Where data lives
- In our AWS (us-east-1)
- Network boundary
- Crosses internet (TLS 1.3)
- Best for
- Series A→C SaaS startups and SOC 2 / SOX teams comfortable with a standard SaaS trust boundary
Self-hosted Docker
- Where data lives
- In your network (you choose Postgres)
- Network boundary
- Stays inside your perimeter
- Best for
- HIPAA, FedRAMP-aspirant, fintech with strict data residency. Helm chart + Docker Compose.
Open-source collector
- Where data lives
- Source + PR text never leaves; only signed scores transmitted
- Network boundary
- Outbound-only HTTPS (signed payloads)
- Best for
- DoD contractors, defense, classified environments. Open-source Docker agent.
Three things you should know before signing
We'd rather you find these on this page than in your security review. Honesty is cheaper than churn.
We get our own audit
Need our security questionnaire before our call?
We'll send our SIG-Lite, DPA, sub-processor list, and architecture one-pager so your security team can review it asynchronously. Most reviews take us less than 48 hours.
Questions? security@mergewhy.com (or just email Dheeraj directly)