1. Introduction
Pirca Labs S.A.S. ("we", "our", or "us") operates the "Shhh" Slack integration. We believe that privacy is a fundamental right. Our application is built on a strict Zero-Knowledge architecture, meaning we cannot read, access, or recover the secret messages you send through our service.
2. Data We Request (Principle of Least Privilege)
To provide our service within your Slack workspace, we request the absolute minimum permissions necessary. We do not have access to your channel history, direct messages history, files, or personal emails.
commands: To enable the /shhh slash command.chat:write: Exclusively to post the interactive block containing the encrypted secret into a channel or direct message.users:read: Solely to retrieve the Slack User ID and locale/language preferences for interface internationalization.
3. Data Processing and Storage (Zero-Knowledge Architecture)
- Encryption in Transit: All payloads travel from Slack to our AWS infrastructure using TLS 1.3.
- Envelope Encryption: Secrets are encrypted in memory using
AES-256-GCM. The data key used for encryption is itself encrypted via AWS KMS. We do not hold the master key. - Ephemeral Storage: Encrypted payloads are stored temporarily in an AWS DynamoDB table. The moment a secret is revealed by the recipient, an atomic delete command (
DeleteItemCommand) is executed. - No Backups: Our databases have Point-in-Time Recovery (PITR) disabled. Once a message is read or expires via TTL, it is permanently and irreversibly destroyed.
4. Third-Party Services & Tracking
We do not use tracking cookies, behavioral analytics (e.g., Google Analytics, Meta Pixel), or marketing trackers.
- Infrastructure: Our servers are hosted securely on Amazon Web Services (AWS).
- Payments: We use Paddle.com as our Merchant of Record. We do not process or store credit card information. The only data linking a payment to your workspace is your Slack
team_id, used exclusively to activate your Pro subscription quota. - Logs: System logs are strictly anonymized for operational monitoring (e.g., tracking the event of a secret creation, but never the sender, recipient, or content).