tessl install github:jeremylongshore/claude-code-plugins-plus-skills --skill coderabbit-data-handlingImplement CodeRabbit PII handling, data retention, and GDPR/CCPA compliance patterns. Use when handling sensitive data, implementing data redaction, configuring retention policies, or ensuring compliance with privacy regulations for CodeRabbit integrations. Trigger with phrases like "coderabbit data", "coderabbit PII", "coderabbit GDPR", "coderabbit data retention", "coderabbit privacy", "coderabbit CCPA".
Review Score
84%
Validation Score
12/16
Implementation Score
73%
Activation Score
100%
Handle sensitive data correctly when integrating with CodeRabbit.
| Category | Examples | Handling |
|---|---|---|
| PII | Email, name, phone | Encrypt, minimize |
| Sensitive | API keys, tokens | Never log, rotate |
| Business | Usage metrics | Aggregate when possible |
| Public | Product names | Standard handling |
const PII_PATTERNS = [
{ type: 'email', regex: /[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}/g },
{ type: 'phone', regex: /\b\d{3}[-.]?\d{3}[-.]?\d{4}\b/g },
{ type: 'ssn', regex: /\b\d{3}-\d{2}-\d{4}\b/g },
{ type: 'credit_card', regex: /\b\d{4}[- ]?\d{4}[- ]?\d{4}[- ]?\d{4}\b/g },
];
function detectPII(text: string): { type: string; match: string }[] {
const findings: { type: string; match: string }[] = [];
for (const pattern of PII_PATTERNS) {
const matches = text.matchAll(pattern.regex);
for (const match of matches) {
findings.push({ type: pattern.type, match: match[0] });
}
}
return findings;
}function redactPII(data: Record<string, any>): Record<string, any> {
const sensitiveFields = ['email', 'phone', 'ssn', 'password', 'apiKey'];
const redacted = { ...data };
for (const field of sensitiveFields) {
if (redacted[field]) {
redacted[field] = '[REDACTED]';
}
}
return redacted;
}
// Use in logging
console.log('CodeRabbit request:', redactPII(requestData));| Data Type | Retention | Reason |
|---|---|---|
| API logs | 30 days | Debugging |
| Error logs | 90 days | Root cause analysis |
| Audit logs | 7 years | Compliance |
| PII | Until deletion request | GDPR/CCPA |
async function cleanupCodeRabbitData(retentionDays: number): Promise<void> {
const cutoff = new Date();
cutoff.setDate(cutoff.getDate() - retentionDays);
await db.coderabbitLogs.deleteMany({
createdAt: { $lt: cutoff },
type: { $nin: ['audit', 'compliance'] },
});
}
// Schedule daily cleanup
cron.schedule('0 3 * * *', () => cleanupCodeRabbitData(30));async function exportUserData(userId: string): Promise<DataExport> {
const coderabbitData = await coderabbitClient.getUserData(userId);
return {
source: 'CodeRabbit',
exportedAt: new Date().toISOString(),
data: {
profile: coderabbitData.profile,
activities: coderabbitData.activities,
// Include all user-related data
},
};
}async function deleteUserData(userId: string): Promise<DeletionResult> {
// 1. Delete from CodeRabbit
await coderabbitClient.deleteUser(userId);
// 2. Delete local copies
await db.coderabbitUserCache.deleteMany({ userId });
// 3. Audit log (required to keep)
await auditLog.record({
action: 'GDPR_DELETION',
userId,
service: 'coderabbit',
timestamp: new Date(),
});
return { success: true, deletedAt: new Date() };
}// Only request needed fields
const user = await coderabbitClient.getUser(userId, {
fields: ['id', 'name'], // Not email, phone, address
});
// Don't store unnecessary data
const cacheData = {
id: user.id,
name: user.name,
// Omit sensitive fields
};Categorize all CodeRabbit data by sensitivity level.
Add regex patterns to detect sensitive data in logs.
Apply redaction to sensitive fields before logging.
Configure automatic cleanup with appropriate retention periods.
| Issue | Cause | Solution |
|---|---|---|
| PII in logs | Missing redaction | Wrap logging with redact |
| Deletion failed | Data locked | Check dependencies |
| Export incomplete | Timeout | Increase batch size |
| Audit gap | Missing entries | Review log pipeline |
const findings = detectPII(JSON.stringify(userData));
if (findings.length > 0) {
console.warn(`PII detected: ${findings.map(f => f.type).join(', ')}`);
}const safeData = redactPII(apiResponse);
logger.info('CodeRabbit response:', safeData);const userExport = await exportUserData('user-123');
await sendToUser(userExport);For enterprise access control, see coderabbit-enterprise-rbac.