GitMon
GitMon
← Back to GitMon

Security

Last updated: April 12, 2026

GitMon handles GitHub OAuth tokens, developer activity, and — at higher opt-in levels — browser usage data. We take that responsibility seriously. This page documents how we protect your data, how to report a vulnerability, and who to contact.

Report a vulnerability

If you believe you have found a security issue in GitMon — web app, API, browser extension, or infrastructure — please report it privately. Do not open a public GitHub issue or disclose the vulnerability publicly before we have had a chance to fix it.

Contact: bruno@b2tech.io

Subject line: [SECURITY] <short description>

Please include: a description of the issue, steps to reproduce, the impact you observed, and (if possible) a proof of concept.

Our commitments

Scope

The following surfaces are in scope for responsible disclosure:

Out of scope:

How we protect your data

Infrastructure

Infrastructure-level security issues (Supabase, Vercel, Upstash) should be reported to those vendors directly.

Compliance alignment

GitMon is an independent project and is not yet formally certified under any security framework. Our practices are aligned with:

Past incidents

No security incidents have been reported to date. We will publish post-mortems here for any future incidents that affect user data.

See also

Contact

Security and general inquiries: bruno@b2tech.io

GitMon is operated by Bruno Bracaioli, an independent developer based in Brazil.