Security
Last updated: April 2026
Evaal touches sensitive engineering data: pull request metadata, communication patterns, calendar load, and the signals from which Evaal infers team health. This page is the running summary of how Evaal protects that data and the certifications Evaal is working toward.
If you are evaluating Evaal and need to share this with your security team, email hello@evaal.ai for the current security questionnaire response and a walkthrough with the engineering lead.
Encryption
Customer data is encrypted in transit using TLS 1.3. Customer data is encrypted at rest using AES-256.
OAuth tokens for connected systems (GitHub, Linear, Slack, Calendar) are stored in a dedicated secrets store and are never written to logs.
Access controls
Evaal staff access to production data is limited to a small on-call engineering group, requires multi-factor authentication, and is logged. Customer data is never accessed except in response to a customer support request or to investigate an incident.
Customer-side access is gated by your existing identity provider via OAuth; SSO via SAML/SCIM will be supported before general availability.
Data residency
Evaal will offer EU and US data residency at general availability. Data does not cross regions unless the customer explicitly requests it. Subprocessor regions are documented in the DPA.
AI and model training
Evaal does not train any model on customer code, customer messages, customer tickets, or customer metadata. Customer data is never used to improve models that serve other customers.
When Evaal uses third-party LLMs to generate the natural-language summaries you read in your morning briefing, the prompts contain only the minimum metadata required to answer the question, and the LLM provider is contractually prohibited from training on those prompts.
Certifications and audits
Evaal is working toward SOC 2 Type II certification. Target completion is before general availability. Interim attestations and the security questionnaire are available on request.
Evaal will publish a public Trust Centre with audit reports, subprocessor list, and uptime history at trust.evaal.ai before general availability.
Incident response
Evaal will notify affected customers of any security incident that may have exposed their data within the timelines required by the applicable law (GDPR Article 33: within 72 hours for the supervisory authority).
If you believe you have found a security issue, please email hello@evaal.ai. Evaal does not yet operate a public bug bounty programme but acknowledges all reports within two business days.
Questions? Email hello@evaal.ai.