SigSentrySigSentry

Access list

Restrict which users can run analyses against a specific project from chat triggers

By default, any team member can run an analysis against any project from a chat command. The access list lets you tighten that on a per-project basis — useful for projects containing sensitive logs or expensive (e.g., very high log volume) workloads.

How it works

When the access list is empty, all team members can target this project from chat. When the list has at least one entry, only listed users can target this project.

The restriction applies to:

  • Chat commands — Slack, Teams, Discord, Google Chat
  • Support desk auto-triage when triggered by an internal user
  • API requests authenticated as a specific user (JWT)

It does not apply to:

  • API keys — they carry their own permission scope
  • Watchdog auto-runs — those are system-initiated
  • Dashboard access — controlled by team roles, not the access list

Where to manage it

Project → Settings → Access list. Add team members one at a time from a typeahead. Remove with the trash icon.

Only admins and the owner can edit the access list.

Example: locked-down billing-data project

The "Billing" project has logs containing customer payment metadata. You want only the finance ops team to run analyses against it.

Add the finance ops users to the access list

Project → Settings → Access list → Add user. Add each finance ops team member.

Verify other users see the lockout

Anyone not on the list typing @SigSentry analyze ... --project=billing in chat will get a "You don't have access to this project" response.

Owners and admins are not auto-included

Even an admin must be explicitly added to the access list — there's no implicit override. This avoids surprise access for new admins.

When to use it

ScenarioUse access list?
Sensitive logs (PII, payments)Yes
Expensive log sources you don't want casually queriedYes
Production project where casual analyses might consume quotaMaybe
Internal tooling project where everyone should have accessNo
Sandbox / stagingNo

Removing yourself

A user can remove themselves from a project's access list. They lose chat access immediately. Re-adding requires an admin.