Search Emails & Activities works like a metal detector for your CRM. It finds what matters without the hassle.
Note: Only works with monday CRM Emails & Activities
Security & Compliance
Security
Does the developer periodically perform penetration testing?
Not answered
Does the developer have a dedicated security and privacy point of contact for such issues or questions?
Yes
hello@appstronauts.shop
Does the app restrict redirects and forwards only to approved destinations, or show a warning when redirecting to potentially untrusted content?
Yes
The app doesn’t perform redirects
Does the app protect against mass parameter assignment attacks?
Yes
Yes, the app implements input validation and uses allowlists/whitelists to explicitly define which parameters can be modified through DTOs (Data Transfer Objects) or schema validation libraries, preventing unauthorized mass assignment of object properties.RetryAJ
Does the app perform encoding and sanitization on all user supplied parameters to protect against Cross-Site Scripting?
Yes
Yes, the app sanitizes all user-supplied parameters by escaping HTML special characters, validating input against expected formats, and using context-aware output encoding (HTML, JavaScript, URL) to prevent Cross-Site Scripting attacks across all rendering contexts.RetryAJ
Does the developer protect all state-changing actions against Cross-Site Request Forgery (CSRF)?
Not answered
Does the developer have mechanisms to notify monday.com in case of a security breach?
Yes
In the event of a serious incident affecting customer data, we will immediately notify the marketplace support team.
Does this developer have a process for installing application-level updates and security patches for the service (such as software packages and databases)?
Not answered
Compliance
Is the app certified with the information security standard ISO/IEC 27001:2022?
Not answered
Is the app compliant with the Health Insurance Portability and Accountability Act (HIPAA)?
Not answered
Is the app certified with System and Organization Controls (SOC 2 or SOC 3)?
Not answered
Is the app compliant with the General Data Protection Regulation (GDPR)?
Not answered
Data
Does the app send any data outside of monday.com? If yes, indicate whether the data is customer-submitted (e.g., board names, item names, doc content) or non-customer-submitted (e.g., account ID, board ID, user ID).
Not answered
Where does the app store logs data?
aws
Logs are stored in AWS (Amazon Web Services) using secure cloud storage services with encryption at rest and in transit. AWS provides enterprise-grade security, compliance certifications (SOC 2, ISO 27001), and regional data residency options to ensure log data is protected and meets industry security standards.RetryAJ
Where does the app store the app data?
other
App data is stored in Turso DB, a distributed SQLite database platform built on libSQL. Turso provides edge-replicated databases with encryption at rest and in transit, ensuring low-latency access and data security across multiple regions while maintaining GDPR compliance.RetryAJ
Does the developer ensure application logs do not contain secrets or personally-identifiable information (PII)?
Yes
Yes, We implements log scrubbing and filtering mechanisms to automatically redact secrets (API keys, tokens, passwords) and PII (names, emails, phone numbers) from application logs before storage, ensuring sensitive data is never logged.Retry
Is customer data segregated from the data of other customers (for example logically or physically)?
Yes
Yes, customer data is logically segregated using tenant isolation mechanisms such as unique tenant identifiers, row-level security policies, and database-level access controls to ensure each customer's data remains isolated and inaccessible to other customers.
Privacy
Does the developer enforce multi-factor authentication on employees access to systems which may process customer data?
Yes
Yes. We enforce multi-factor authentication (MFA) for employee access to systems that may process customer data. Our team members are required to use Google Authenticator as the primary MFA method, along with mobile OTP as an additional layer of protection to further secure access.
Does the developer protect access to customer data based on the principle of least privilege?
Yes
Yes. As the sole developer of these applications, I follow the principle of least privilege by ensuring that only I have access to customer data, and only when required for development, maintenance, or support purposes. No other individuals have access.
Reviews
December 30, 2025
MM: I was pleased to find out this is the perfect solution for locating all activity. I reached out to Amish because I was hoping to export all of my data and he was able to add that feature for me!
Developer response:
Thanks means a lot
Historical data
Installation history
We have data for December 28, 2024 onwards only. Collected sometime after 00:00 UTC daily.
Total number of installs
Change in total number of installs in last 1 day(s)
Compares the number of installs on each date with 1 days previously:
Max
Min
Current
Change in total number of installs in last 7 day(s)
Compares the number of installs on each date with 7 days previously:
Max
Min
Current
Change in total number of installs in last 30 day(s)
Compares the number of installs on each date with 30 days previously:
Max
Min
Current
Change in total number of installs in last 90 day(s)
Compares the number of installs on each date with 90 days previously:
Max
Min
Current
Change in total number of installs in last 180 day(s)
Compares the number of installs on each date with 180 days previously:
Max
Min
Current
Ratings history
Categories history
Each of the following is a yes/no answer, so the graphs show 1 for yes, and 0 for no.