Skene
SECURITY

Security and data handling

This page gives a concise view of how Skene connects to your repositories and how it uses that data while you evaluate the product.

Security First
Read-only repository access
Revocable at any time from your Git provider
Row-level security in Postgres
PRINCIPLES

Repository access and data handling

Skene connects to your code via your Git provider. You stay in control of which repositories are visible.

Read-only access

Repository content is accessed using credentials scoped to repository contents and metadata, and Skene only performs read operations on your code.

You control access

You choose which repositories Skene can see when you connect it, and you can remove that access at any time from your Git provider.

Purpose-limited use

Skene uses repository data to understand your product and help you design growth loops; it is not intended for unrelated use cases.

No tracking scripts required

Skene is designed to work from your code, APIs, configurations, and docs, rather than requiring additional tracking scripts to start an evaluation.

TRUST

Security at a glance

Read-only repository access
Revocable at any time from your Git provider
Row-level security in Postgres
No persistent code storage
API keys with origin restrictions
Multi-tenant workspace isolation

Need a deeper security review?

If your security, legal, or procurement teams need more detail than this page provides, get in touch and we can walk through the current controls and answer specific questions based on your evaluation setup.

Contact us

Ready to try Skene?

Start with a free trial and connect your first repository.