Security Statement

AutoPrioritizer AI for Jira Cloud

Last updated: April 22, 2026

Architecture Overview

AutoPrioritizer AI is built on Atlassian Forge, Atlassian's serverless app platform. The App runs entirely within Atlassian's infrastructure. There are no external servers, databases, or hosting environments owned or operated by us.

Because the App runs on Forge, we do not manage servers, containers, networking, TLS certificates, or infrastructure patching. Atlassian handles all of this as part of the Forge platform.

Data Flow

The following describes the complete data flow for a prioritization request:

User action (browser)
    |
    v
Forge Custom UI -> Forge Resolver Function
    |                    |
    |                    |-- Reads issue data from Jira (internal Forge-to-Jira call)
    |                    |-- Reads profile/config from Forge KVS
    |                    |-- Sends ticket fields + criteria to Anthropic API (HTTPS)
    |                    |-- Receives AI recommendation from Anthropic API
    |                    |-- Returns recommendation to frontend for user review
    |                    |
    |                    +-- (On user approval) Writes priority field to Jira issue
    v
User sees recommendation, decides whether to apply

Key points:

Authentication and Authorization

Jira API Access

The App uses Forge's built-in asApp() authentication mechanism to access the Jira REST API. This means:

Anthropic API Access

No Shared Secrets

Data at Rest

The only data persisted by the App is stored in Forge KVS, scoped to the installing Jira instance:

DataStorage Key PatternContents
Prioritization profileprofile-{projectKey}Criteria weights (numeric), team context (text), priority descriptions (text), custom rules (text), auto-prioritize toggle (boolean)
Quick filtersfilters-{projectKey}Array of saved JQL filter snippets and labels
Usage statisticsstats-{projectKey}Total count, monthly usage counts, session history (timestamps and counts), monthly active user lists (account IDs for quota calculation)

What is NOT stored:

Forge KVS data is encrypted at rest by Atlassian and is tenant-isolated. For details, see Atlassian Forge data storage documentation.

Data in Transit

All network communication uses encrypted channels:

PathProtocolDetails
Browser to Forge UIHTTPSStandard Atlassian-managed TLS
Forge function to Jira APIInternalForge-to-Jira calls are internal to Atlassian's infrastructure and do not traverse the public internet
Forge function to Anthropic APIHTTPS/TLSOutbound request to api.anthropic.com over TLS 1.2+

No data is transmitted over unencrypted channels.

Input Sanitization

The App sanitizes all Jira issue data before sending it to the Anthropic API:

These measures reduce the risk of prompt injection, limit data exposure, and keep API payloads to the minimum necessary for analysis.

Permissions

The App requests the minimum Atlassian scopes required for its functionality:

ScopePurposeHow It Is Used
read:jira-workRead issue fields for AI analysisReads summary, description, labels, components, issue type, priority, status, and comments. Used during prioritization requests and issue searches.
write:jira-workUpdate issue priorityWrites only to the priority field on Jira issues. No other fields are modified. All writes require explicit user approval (or admin-enabled auto-prioritize).
storage:appPersist App configurationStores prioritization profiles, quick filters, and usage statistics in Forge KVS.

External fetch permissions

The App is authorized to make outbound HTTP requests only to:

No other external domains are contacted. This is enforced by the Forge platform based on the App's manifest declaration.

Third-Party Dependencies

DependencyPurposeData Shared
Anthropic Claude APIAI-powered ticket analysisIssue fields (summary, description, labels, components, comments, type, status, current priority) and team prioritization criteria

What is NOT used:

Anthropic does not use API inputs or outputs to train its models (per their API Terms of Service).

Forge Security Model

Because the App runs on Atlassian Forge, it benefits from Forge's built-in security controls:

Vulnerability Reporting

If you discover a security vulnerability in AutoPrioritizer AI, please report it responsibly:

Email: support@autoprioritizer.app
Subject line: Security Vulnerability -- AutoPrioritizer AI

Please include:

We will acknowledge receipt within 48 hours and work to address confirmed vulnerabilities promptly. We ask that you not publicly disclose the vulnerability until we have had a reasonable opportunity to address it.

For vulnerabilities in the Atlassian Forge platform itself, please report them through Atlassian's security bug bounty program.

Contact

For security-related questions or concerns:

AutoPrioritizer
Email: support@autoprioritizer.app