Security & Privacy
SignalPilot is designed with security-first principles: read-only access, local-first execution, and zero data retention.
Core Security Principles
Read-Only Access
All MCP connections are read-only — no writes to production systems
Local-First Execution
Code runs in your environment — never on SignalPilot servers
Zero Data Retention
No data stored on SignalPilot servers — full privacy
Audit Trail
Track what context was accessed and when
MCP Read-Only Access Model
SignalPilot uses the Model Context Protocol (MCP) to connect to your data stack:Internal MCP Sidecar
The internal sidecar runs within your Jupyter environment:- ✅ Kernel introspection: Read variables, dataframes
- ✅ Schema queries: Read table metadata
- ✅ Query history: Read past queries (no execution)
- ❌ Database writes: Not possible
- ❌ File system writes: Not possible (except notebooks)
External MCP Servers
External MCP servers are read-only by design:| Integration | What SignalPilot Can Read | What It Cannot Do |
|---|---|---|
| dbt | Model definitions, lineage, docs | Modify models, run dbt commands |
| Slack | Public channel threads, messages | Post messages, access private DMs |
| Jira | Tickets, comments, metadata | Create/modify tickets |
| Snowflake/Databricks | Query logs, metadata | Execute queries, modify data |
Approval Workflows
SignalPilot includes built-in approval mechanisms:Hooks: Custom Constraints (Alpha)
Enforce your own rules via pre-execution hooks:Example: Production Query Hours
Example: Row Count Changes
Example: Vectorization Enforcement
Data Retention & Privacy
What SignalPilot Stores
What SignalPilot Stores
- Session metadata: Timestamps, user IDs (anonymized)
- Error logs: Stack traces (no data values)
- Usage metrics: Feature usage, performance
What SignalPilot Does NOT Store
What SignalPilot Does NOT Store
- ❌ Query results: Never stored on our servers
- ❌ Database schemas: Read in real-time, not cached
- ❌ Slack messages: Read via MCP, not stored
- ❌ Source code: Notebooks stay local
Data in Transit
Data in Transit
- TLS 1.3: All connections encrypted
- API keys: Stored locally, never transmitted
- MCP connections: Encrypted via SSH/TLS
SOC 2 Compliance
SignalPilot is working on SOC 2 Type II compliance (status: in progress as of 2026).
- Access controls and authentication
- Data encryption (at rest and in transit)
- Incident response and monitoring
- Vendor risk management