Secure by Design.
Transparent by Default.
We build .git on a foundation of trust, compliance, and zero-trust architecture so you can focus on shipping code, not worrying about security.
Security Pillars
Our comprehensive approach to protecting your infrastructure and data.
Encryption & Data Privacy
Your code and secrets are encrypted at every stage.
- AES-256 Encryption at Rest
- TLS 1.3 in Transit
- Customer Managed Keys (CMK)
- Pseudonymization of Metadata
Access Control
Granular permissions ensure only the right people access your resources.
- Role-Based Access Control (RBAC)
- Single Sign-On (SSO/SAML)
- Multi-Factor Authentication (MFA)
- Just-In-Time (JIT) Access
Infrastructure Security
Built on robust cloud providers with isolated environments.
- Isolated Build Environments
- DDoS Protection & WAF
- Penetration Testing (Quarterly)
- Private Networking (VPC Peering)
Verify Integrity
Transparency is key. Use our CLI to verify the integrity of your builds and deployment artifacts directly in your terminal.
View Verification Docs →Vulnerability Disclosure
We value the security research community. If you find a vulnerability, we encourage responsible disclosure.
🔍 Scope
All .git hosted services, API endpoints, and CLI tools.
⏱️ Response
Initial response within 24 hours. Patch timeline within 30 days.
💰 Bug Bounty
Critical vulnerabilities eligible for rewards up to $10,000.