Security and Trust Model
IntelligenceX is built on a zero-trust design. You do not have to trust an IntelligenceX backend because there is no IntelligenceX backend in the reviewer, IX Chat, CLI, or setup flows.
Core Principles
No Backend Service
IntelligenceX has no hosted control plane. Onboarding happens locally on your machine, IX Chat stores state locally, and the reviewer runs inside your GitHub Actions environment.
Your Credentials, Your Control
You authenticate with your own ChatGPT or Copilot account:
- ChatGPT: OAuth login via browser, auth bundle stored as GitHub Actions secret
- Copilot: uses your existing GitHub Copilot access
- Optional encryption: set
INTELLIGENCEX_AUTH_KEYto encrypt local auth storage
Bring Your Own GitHub App
For organizations that need full control:
- Create a GitHub App under your organization
- Keep your own branding and permission scopes
- Keep your own audit trail in org settings
GitHub Authentication Modes
| Mode | Best For | How It Works |
|---|---|---|
| GitHub App (recommended) | Organizations | Install your own app for branded bot identity and fine-grained permissions |
| OAuth Device Flow | Single repos | Fast setup, no app required |
| Personal Access Token | Restricted environments | Policy-compliant manual token management |
What the Tool Changes
IntelligenceX keeps repo changes minimal and reviewable:
- Adds
.github/workflows/review-intelligencex.yml - Optionally adds
.intelligencex/reviewer.json - Uses PRs by default for setup changes
Data Flow
When the reviewer analyzes a PR:
- GitHub Actions checks out your code diff
- Diff is sent directly to your selected AI provider
- AI response is posted as PR comments
No data passes through IntelligenceX infrastructure.
Provider policies still apply:
Manual Secret Mode
If you do not want automatic secret upload:
intelligencex setup wizard --manual-secretThe CLI writes the base64 auth bundle to a local temporary file and prints only that file path for manual secret entry. If you prefer the old copy/paste flow, add --manual-secret-stdout to print it directly (less safe due to terminal/log exposure).
Best Practices
- Set
INTELLIGENCEX_AUTH_KEYfor encrypted local storage - Use least-privilege GitHub App permissions
- Rotate tokens periodically (
intelligencex auth login) - Keep setup changes in PRs
- Monitor provider usage with
intelligencex usage --events
Open Source
IntelligenceX is open source (MIT):
- Source code
- Reviewable security model
- Forkable and extensible