Ctrl + k

or run

tessl search
Log in

coderabbit-data-handling

tessl install github:jeremylongshore/claude-code-plugins-plus-skills --skill coderabbit-data-handling
github.com/jeremylongshore/claude-code-plugins-plus-skills

Implement CodeRabbit PII handling, data retention, and GDPR/CCPA compliance patterns. Use when handling sensitive data, implementing data redaction, configuring retention policies, or ensuring compliance with privacy regulations for CodeRabbit integrations. Trigger with phrases like "coderabbit data", "coderabbit PII", "coderabbit GDPR", "coderabbit data retention", "coderabbit privacy", "coderabbit CCPA".

Review Score

84%

Validation Score

12/16

Implementation Score

73%

Activation Score

100%

CodeRabbit Data Handling

Overview

Handle sensitive data correctly when integrating with CodeRabbit.

Prerequisites

  • Understanding of GDPR/CCPA requirements
  • CodeRabbit SDK with data export capabilities
  • Database for audit logging
  • Scheduled job infrastructure for cleanup

Data Classification

CategoryExamplesHandling
PIIEmail, name, phoneEncrypt, minimize
SensitiveAPI keys, tokensNever log, rotate
BusinessUsage metricsAggregate when possible
PublicProduct namesStandard handling

PII Detection

const PII_PATTERNS = [
  { type: 'email', regex: /[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}/g },
  { type: 'phone', regex: /\b\d{3}[-.]?\d{3}[-.]?\d{4}\b/g },
  { type: 'ssn', regex: /\b\d{3}-\d{2}-\d{4}\b/g },
  { type: 'credit_card', regex: /\b\d{4}[- ]?\d{4}[- ]?\d{4}[- ]?\d{4}\b/g },
];

function detectPII(text: string): { type: string; match: string }[] {
  const findings: { type: string; match: string }[] = [];

  for (const pattern of PII_PATTERNS) {
    const matches = text.matchAll(pattern.regex);
    for (const match of matches) {
      findings.push({ type: pattern.type, match: match[0] });
    }
  }

  return findings;
}

Data Redaction

function redactPII(data: Record<string, any>): Record<string, any> {
  const sensitiveFields = ['email', 'phone', 'ssn', 'password', 'apiKey'];
  const redacted = { ...data };

  for (const field of sensitiveFields) {
    if (redacted[field]) {
      redacted[field] = '[REDACTED]';
    }
  }

  return redacted;
}

// Use in logging
console.log('CodeRabbit request:', redactPII(requestData));

Data Retention Policy

Retention Periods

Data TypeRetentionReason
API logs30 daysDebugging
Error logs90 daysRoot cause analysis
Audit logs7 yearsCompliance
PIIUntil deletion requestGDPR/CCPA

Automatic Cleanup

async function cleanupCodeRabbitData(retentionDays: number): Promise<void> {
  const cutoff = new Date();
  cutoff.setDate(cutoff.getDate() - retentionDays);

  await db.coderabbitLogs.deleteMany({
    createdAt: { $lt: cutoff },
    type: { $nin: ['audit', 'compliance'] },
  });
}

// Schedule daily cleanup
cron.schedule('0 3 * * *', () => cleanupCodeRabbitData(30));

GDPR/CCPA Compliance

Data Subject Access Request (DSAR)

async function exportUserData(userId: string): Promise<DataExport> {
  const coderabbitData = await coderabbitClient.getUserData(userId);

  return {
    source: 'CodeRabbit',
    exportedAt: new Date().toISOString(),
    data: {
      profile: coderabbitData.profile,
      activities: coderabbitData.activities,
      // Include all user-related data
    },
  };
}

Right to Deletion

async function deleteUserData(userId: string): Promise<DeletionResult> {
  // 1. Delete from CodeRabbit
  await coderabbitClient.deleteUser(userId);

  // 2. Delete local copies
  await db.coderabbitUserCache.deleteMany({ userId });

  // 3. Audit log (required to keep)
  await auditLog.record({
    action: 'GDPR_DELETION',
    userId,
    service: 'coderabbit',
    timestamp: new Date(),
  });

  return { success: true, deletedAt: new Date() };
}

Data Minimization

// Only request needed fields
const user = await coderabbitClient.getUser(userId, {
  fields: ['id', 'name'], // Not email, phone, address
});

// Don't store unnecessary data
const cacheData = {
  id: user.id,
  name: user.name,
  // Omit sensitive fields
};

Instructions

Step 1: Classify Data

Categorize all CodeRabbit data by sensitivity level.

Step 2: Implement PII Detection

Add regex patterns to detect sensitive data in logs.

Step 3: Configure Redaction

Apply redaction to sensitive fields before logging.

Step 4: Set Up Retention

Configure automatic cleanup with appropriate retention periods.

Output

  • Data classification documented
  • PII detection implemented
  • Redaction in logging active
  • Retention policy enforced

Error Handling

IssueCauseSolution
PII in logsMissing redactionWrap logging with redact
Deletion failedData lockedCheck dependencies
Export incompleteTimeoutIncrease batch size
Audit gapMissing entriesReview log pipeline

Examples

Quick PII Scan

const findings = detectPII(JSON.stringify(userData));
if (findings.length > 0) {
  console.warn(`PII detected: ${findings.map(f => f.type).join(', ')}`);
}

Redact Before Logging

const safeData = redactPII(apiResponse);
logger.info('CodeRabbit response:', safeData);

GDPR Data Export

const userExport = await exportUserData('user-123');
await sendToUser(userExport);

Resources

  • GDPR Developer Guide
  • CCPA Compliance Guide
  • CodeRabbit Privacy Guide

Next Steps

For enterprise access control, see coderabbit-enterprise-rbac.