Security Policy

Last updated: April 6, 2026

1. Overview

Priority Scoring — RICE, WSJF, ICE & Rovo AI for Jira ("the App") is built on the Atlassian Forge platform and operates entirely within Atlassian's infrastructure under the Runs on Atlassian trust boundary. The App makes no outbound network calls to any external server and stores no credentials of any kind. This document describes the App's security architecture, data protection measures, and our security practices.

2. Architecture & Runtime Environment

The App runs entirely within Atlassian's Forge runtime:

3. Access Control

Control Details
User-context actions Score values written to Jira custom fields as a direct result of user input use api.asUser(), inheriting the user's existing Jira permissions.
App-context actions All other Jira API calls (reading issues, health checks, field discovery) as well as Rovo AI agent actions use api.asApp() with app-level scopes declared in the manifest.
Minimal API scopes The App requests only the scopes required for its features: storage:app, read:jira-work, write:jira-work, and Rovo-specific scopes. No admin-level Jira permissions are requested.
Rovo AI apply-mode control Administrators can restrict the Rovo AI agent to "suggest only" or "confirm before apply" mode, preventing the agent from autonomously writing scores without user approval.
Developer access None. We cannot read, access, or export any data stored in your Jira instance or Forge storage. All data resides within Atlassian's infrastructure.

4. Data Protection

Data in transit:

Data at rest:

Data minimization:

5. No External Credentials or Integrations

Unlike apps that connect to external services, Priority Scoring does not require or accept any API keys, tokens, passwords, or third-party credentials. There is no configuration that could expose user secrets, and there are no external integrations beyond the Atlassian platform itself.

6. Dependency Management

7. Vulnerability Management

8. Incident Response

If a security issue is discovered in the App:

To report a security vulnerability, please contact support@janekbehrens.de with the subject line "Security Report — Priority Scoring". We aim to acknowledge reports within 2 business days.

9. Organizational Security Controls

10. Compliance

11. What We Cannot Access

For complete transparency, we have no technical means to access:

12. Contact

For security questions or to report a vulnerability:
Email: support@janekbehrens.de
Subject: Security Report — Priority Scoring