Security Policy

HammerR&D for Atlassian JIRA

How we protect your JIRA data, manage secrets, handle vulnerabilities, and respond to security incidents.

Last updated: March 23, 2026

Architecture Overview

HammerR&D is an Atlassian Forge app — it runs entirely within Atlassian's cloud infrastructure. There are no external servers, no self-hosted backends, and no customer-accessible endpoints outside of the Atlassian ecosystem.

Forge Sandbox: All app code executes in Atlassian's isolated Forge runtime — no direct access to the host JIRA instance's infrastructure.

No Forge Remote: The app does not use Forge Remote. There is no external backend or server that processes data outside of Forge.

No Web Triggers: The app has no publicly accessible webhooks or HTTP endpoints.

No User Credentials: The app never collects Atlassian passwords, personal access tokens, or any user credentials.

Data Handling

What data the app reads

HammerR&D reads the following JIRA issue fields to perform R&D signal scoring:

Where data is stored

R&D scores and analysis results are stored in Atlassian Forge Storage, which is hosted and managed by Atlassian within your JIRA instance's data residency region. We do not store any JIRA data on external servers.

External data processing

Issue text (summary and description) is sent to the Anthropic Claude API for AI-powered R&D signal analysis. This is the only external data egress. Anthropic processes data in real time and does not retain input data beyond the duration of the API call, per their data retention policy.

Permissions & Least Privilege

HammerR&D follows the principle of least privilege:

The app requests no write permissions to JIRA content, no admin scopes, and no access to user profiles, emails, or personal data.

Secrets Management

Input Validation

Dependency Management

Vulnerability Management

We follow Atlassian's Marketplace Security Bug Fix Policy with the following response times:

Critical (CVSS 9.0+)

24 hours

High (CVSS 7.0–8.9)

7 days

Medium (CVSS 4.0–6.9)

30 days

Low (CVSS < 4.0)

Next release

Incident Response

In the event of a security incident affecting HammerR&D:

  1. Identification & Containment: Detect, classify, and isolate affected components immediately.
  2. Investigation: Determine root cause, affected data scope, and blast radius.
  3. Customer Notification: Affected customers notified within 72 hours of a confirmed breach.
  4. Atlassian Notification: Marketplace team notified per the Marketplace Incident Notification Policy.
  5. Remediation: Patch deployed and verified before closing the incident.
  6. Post-Mortem: Root cause documented, controls updated to prevent recurrence.

Logging & Monitoring

Report a Security Issue

If you discover a security vulnerability in HammerR&D, please report it responsibly:

support@hammerai.ai

We acknowledge all reports within 48 hours and ask that you allow reasonable time for investigation before public disclosure.