Transport should run over TLS and sensitive stored values should be encrypted at rest with rotated keys. Signed webhook payloads and audit-chain hashes help detect tampering.
Your code, integrations, and operator workflows should stay controlled.
Potsticker.AI is being hardened to keep repo access, integrations, and AI operations deliberate instead of vague or accidental.
Potsticker.AI should make its access model, privacy stance, and commercial boundaries obvious before a buyer ever has to book a call or email your team.
Potsticker.AI does not require making your repositories public. Repo integrations use tokens you control, and the system reads provider metadata from repos you already own.
The platform is designed around read-first, proposal-first, and controlled execution patterns. Protected zones, allowed roots, and rate limits exist to keep automation from becoming reckless.
Billing, analytics, deploy, incident, publishing, and repo integrations only work when you deliberately connect them with your own keys, tokens, or webhooks.
Current access is invite-led and staged carefully. We keep rollout deliberate while production persistence, trust surfaces, and onboarding continue to harden.
Once the security, privacy, and legal basics feel clear, the next step should be obvious: watch the walkthrough or request launch access.