Support
Help for Ghost Architect™ CLI and the Ghost Architect Mobile app.
// contact
Email: support@ghostarchitect.dev
Typical response time: within 1 business day
// ghost architect mobile
Ghost Architect Mobile is the iOS and iPadOS companion app for Ghost Architect™. It gives architects, CTOs, and agency leaders a portfolio view of all their Ghost reports — remediation progress, critical findings, and estimated cost — on their phone or tablet.
What does the app do?
Ghost Architect Mobile reads Ghost Architect™ reports from a private GitHub repository and displays them as an interactive portfolio. You can see overall remediation progress across all your projects, drill into any individual project's findings, and present results to stakeholders in a client-ready Present Mode.
Do I need a Ghost Architect™ subscription to use the app?
You need Ghost Architect™ Pro, Team, or Enterprise to generate reports that can be published to the mobile app. Ghost Open (the free tier) does not include mobile publishing.
How do I connect my own data?
The app uses a GitHub Personal Access Token (PAT) to read reports from a private repository you control. Tap Settings in the app, enter your GitHub PAT and repository URL, and your reports will sync. Your PAT is stored only on your device — it is never transmitted to Ghost Architect™ servers.
What is Demo Mode?
When you first install the app, you see a seeded demo portfolio with a single example project (meta-for-magento2) showing what Ghost Architect™ reports look like. Demo data stays until you connect your own GitHub repository in Settings. You can revisit Demo Mode at any time from Settings.
Why is my report not showing up?
- Confirm your GitHub PAT has
reposcope for the repository - Confirm the repository contains Ghost Architect report files at the expected path
- Confirm you are on a Ghost Pro, Team, or Enterprise plan (reports from Ghost Open are not published to the mobile app)
- Pull down on the portfolio screen to force a refresh
// ghost architect cli
What is Ghost Architect™?
Ghost Architect™ is an AI-powered codebase triage tool that runs locally in your terminal. It reads your codebase, categorizes findings by severity and business impact, estimates remediation cost, and generates reports you can share with clients or stakeholders. It works on any language, any platform, any codebase.
How do I install it?
Ghost Open (free tier) is available on npm:
npm install -g ghost-architect-open
Ghost Pro, Team, and Enterprise are distributed via private npm with installation instructions delivered after purchase at ghostarchitect.dev/pricing.
What are the requirements?
- Node.js 18 or later
- An Anthropic API key (BYOK — Bring Your Own Key)
- macOS, Windows, or Linux
Is my code sent to your servers?
No. Ghost Architect™ runs entirely on your machine. Your code is sent directly from your machine to the Anthropic API using your own API key — Ghost Architect™ servers never see your code. See the Privacy Policy for details.
// billing and subscriptions
How do I cancel my subscription?
Ghost Architect™ Pro, Team, and Enterprise subscriptions are managed through Stripe. You will receive a billing portal link in your purchase confirmation email. If you cannot locate the link, email support@ghostarchitect.dev and we will send you one.
Do you offer refunds?
Refund requests are handled on a case-by-case basis. Contact support@ghostarchitect.dev with your subscription details and we will work with you directly.
// bug reports and feature requests
For Ghost Open, please file issues on GitHub.
For Ghost Pro, Team, Enterprise, and Ghost Architect Mobile, email support@ghostarchitect.dev with:
- A clear description of the issue or requested feature
- Your Ghost Architect™ version (run
ghost --versionin the CLI) - Your operating system
- Any relevant error messages or screenshots
// security disclosures
If you discover a security issue in Ghost Architect™, please disclose it responsibly by emailing support@ghostarchitect.dev with "SECURITY" in the subject line. Please do not file public GitHub issues for security vulnerabilities.