security
Raw Claude Code logs stay on your machine.
The launch flow is local-first: parse, redact, and summarize locally; upload only the sanitized report JSON you can inspect first.
Agent Analyzer is an independent third-party tool and is not affiliated with Anthropic.
Data Flow
~/.claude/projects/*.jsonl -> agent-analyzer CLI on your machine -> local secret scrubber and deterministic parser -> ./agent-analyzer-report.json -> optional user review with jq/cat -> POST /api/client-reports -> short-lived report URL
Controls
- No browser file picker and no hidden access to `~/.claude`.
- No one-time bearer token pasted into a web-provided shell snippet for the public flow.
- No raw transcript is sent to an LLM.
- No raw Claude Code JSONL logs are received by the public web flow.
- No model tools, browsing, shell, filesystem, memory, or MCP access are used for interpretation.
- Server intake is bounded to sanitized report JSON and rejects reports that claim raw transcript LLM exposure.
- Operational logs are allowlisted to metadata, timings, status, buckets, and error categories.
Threat Model
We assume Claude Code logs are sensitive and may contain source code, command output, API responses, secrets, hostnames, usernames, and customer data. The primary mitigation is to keep raw logs local. Server-side retention and redaction are defense in depth, not the primary trust boundary.