Privacy Policy

This page summarizes how Agent Breach handles personal data for account management, platform operation, and security services.

We process data necessary to provide the service, protect accounts, and deliver requested security scans. Optional analytics and marketing technologies are controlled through cookie preferences.

For cookie and similar technology details, visit the Cookie Policy page.

Hosted Repository Scanning

When you enable hosted PR scanning, Agent Breach processes repository data required for security analysis, including source files, dependency manifests/lockfiles, workflow files, and pull request metadata.

Scan execution is limited to authorized repositories and pull request commit context (head/base) to provide targeted analysis of the requested change set.

Retention and Deletion

Hosted scan workspaces are designed to be temporary and are deleted after verification and reporting steps, including failure paths and periodic stale workspace cleanup.

Agent Breach retains scan findings, policy outcomes, and limited audit metadata for product functionality, support, and security/compliance evidence according to service retention controls.

Consent and Legal Basis

Hosted repository scanning requires explicit customer consent in the integrations flow and may require re-consent when processing terms materially change.

For support or data requests, contact the Agent Breach support channel listed on the Support page.