Effective March 2026
At Phoebuz, security is foundational to everything we build. ASYNC is designed from the ground up to protect your engineering data using Atlassian's enterprise-grade infrastructure, strong encryption, and privacy-preserving access controls. This document describes our security architecture, data handling practices, and the measures we take to safeguard your information.
ASYNC is built entirely on Atlassian Forge, Atlassian's serverless app platform. This means:
All persistent data is stored using the Forge Storage API, Atlassian's managed key-value and entity storage service.
All data transmitted between ASYNC, Atlassian services, and external integrations is protected in transit.
ASYNC relies on Atlassian's built-in authentication for all user access. Users must be authenticated through their Atlassian account before interacting with ASYNC.
For external integrations (GitHub, Slack, Zoom), ASYNC uses OAuth 2.0 authorization flows. Tokens are stored securely in Forge Storage with the same AES-256 encryption at rest. ASYNC never stores user passwords for any external service.
ASYNC requests only the minimum scopes necessary for each integration. Below is a complete list of scopes requested, organized by provider, along with the justification for each.
| Scope | Purpose |
|---|---|
repo |
Access pull request data, commit history, and code review activity for intelligence cards and standup generation. |
read:user |
Read user profile information to map GitHub identities to Atlassian users. |
user:email |
Read the user's email address for identity correlation across connected platforms. |
| Scope | Purpose |
|---|---|
channels:read |
List public channels to allow teams to select which channels to monitor. |
channels:history |
Read message history in public channels for team communication analysis and blocker detection. |
channels:join |
Join public channels selected by the team for monitoring. |
groups:read |
List private channels the bot has been invited to, for team-selected monitoring. |
groups:history |
Read message history in private channels (only those the bot has been invited to) for communication analysis and blocker detection. |
users:read |
Read workspace user profiles for identity mapping across platforms. |
users:read.email |
Read user email addresses for cross-platform identity correlation. |
chat:write |
Post messages to channels (e.g., standup summaries, blocker alerts, intelligence notifications). |
team:read |
Read basic workspace information for multi-workspace identification. |
| Scope | Purpose |
|---|---|
user:read:user |
Read user profile data for identity mapping across platforms. |
user:read:email |
Read user email for cross-platform identity correlation. |
meeting:read |
Read meeting metadata (participants, duration, frequency) for meeting load analysis and focus time calculation. |
cloud_recording:read |
Read cloud recording metadata and transcripts for meeting intelligence and decision tracking. |
| Scope | Purpose |
|---|---|
read:confluence-space.summary |
Read space summaries to identify relevant documentation spaces for the team. |
read:confluence-content.all |
Read page and blog content for documentation intelligence, knowledge coverage analysis, and staleness detection. |
search:confluence |
Search Confluence content to surface relevant documentation in context (e.g., related design docs for active Jira issues). |
| Scope | Purpose |
|---|---|
read:jira-work |
Read issues, worklogs, and project data for sprint health, velocity, and standup generation. |
read:jira-user |
Read user profiles for identity resolution and workload analysis. |
read:sprint:jira-software |
Read sprint data for sprint health monitoring, velocity tracking, and burndown analysis. |
read:board-scope:jira-software |
Read board configuration and scope for board-level intelligence and team structure mapping. |
ASYNC connects to the following external services. Each connection is made over HTTPS and is limited to the minimum data exchange necessary for the feature it supports.
| Endpoint | Justification |
|---|---|
api.github.com |
Retrieve pull request, commit, and code review data for engineering intelligence. |
slack.com |
Access team communication data for blocker detection and communication analysis. |
api.zoom.us |
Retrieve meeting metadata and recording transcripts for meeting intelligence. |
api.anthropic.com |
AI synthesis — send structured engineering data for natural language summarization, standup generation, and copilot responses. |
api.openai.com |
AI synthesis — send structured engineering data for natural language summarization, standup generation, and copilot responses. |
generativelanguage.googleapis.com |
AI synthesis — send structured engineering data for natural language summarization, standup generation, and copilot responses. |
ASYNC does not connect to any advertising networks, analytics platforms, or third-party tracking services.
ASYNC sends structured, aggregated engineering data to large language model (LLM) providers for AI-powered features such as standup generation, copilot queries, and retrospective synthesis.
ASYNC implements a three-rule access control model to protect individual privacy while enabling team visibility:
This model ensures that ASYNC is never used as a surveillance tool. Individual engineers always control their own data visibility, and access to individual-level data is restricted, auditable, and role-based.
ASYNC does not use cookies. ASYNC does not use any client-side tracking scripts, pixels, or analytics beacons. There is no fingerprinting, no local storage tracking, and no third-party advertising or analytics integration.
Because ASYNC is built entirely on Atlassian Forge, it inherits the compliance posture of Atlassian's cloud platform:
ASYNC does not independently hold SOC 2 or ISO 27001 certification, but because all data storage and compute runs within Atlassian Forge, customers benefit from Atlassian's platform-level certifications and controls.
If you discover a security vulnerability in ASYNC, we encourage responsible disclosure. Please report any security issues to:
We will acknowledge receipt within 2 business days and work to address confirmed vulnerabilities promptly. We ask that you refrain from publicly disclosing the vulnerability until we have had an opportunity to investigate and remediate.
For questions about this Security Statement or ASYNC's security practices, contact us at info@phoebuz.com.