2026-05-11·5 min read·sota.io Team

CircleCI EU Alternative 2026: Delaware C-Corp, January 2023 Secrets Breach, GitLab CI/Woodpecker CI EU-Native DevOps

Post #2 in the sota.io EU DevOps Tools Series

CircleCI EU Alternative 2026 — Delaware C-Corp CLOUD Act CI/CD Secrets Breach GDPR DevOps Sovereignty

CircleCI is one of the most widely used hosted CI/CD platforms in the world. Launched in 2011, it was among the first SaaS products to bring continuous integration to GitHub-hosted repositories at scale. For development teams that standardised on CircleCI in the mid-2010s, its tight GitHub integration, parallelism model, and orb ecosystem made it the default choice for test automation and deployment pipelines.

But CircleCI carries two risks that EU development teams must evaluate before committing to it for GDPR-sensitive DevOps workflows: first, its Delaware incorporation and US headquarters mean the Clarifying Lawful Overseas Use of Data Act (CLOUD Act) applies to all data held on its infrastructure, including source code, environment variables, and production secrets. Second, in January 2023, CircleCI suffered a major security breach in which attackers stole customer environment variables, API tokens, and secrets from the CircleCI platform — proving that CI/CD infrastructure is a high-value target precisely because of the sensitive credentials it holds.

This guide analyses both risks and presents EU-native CI/CD alternatives that provide genuine data sovereignty for European development teams.


CircleCI, Inc.: Delaware C-Corp, San Francisco Headquarters

CircleCI was founded in 2011 in San Francisco, California by Paul Biggar and Allen Rohner. The company is incorporated as CircleCI, Inc. — a Delaware C-Corporation — headquartered at 750 Market Street, San Francisco, CA 94102.

DimensionDetail
Legal entityCircleCI, Inc.
IncorporationDelaware C-Corporation
HeadquartersSan Francisco, California, USA
Founded2011
Funding (total)~$315 million (IVP, Baseline Ventures, Top Tier Capital, DFJ)
Employees~800 (2023)
Primary data regionUS East (default); EU West available
EU runner regionEU West (Ireland) — jurisdiction remains CircleCI/US

The critical legal fact is straightforward: CircleCI, Inc. is a US corporation incorporated in Delaware. Regardless of which AWS or GCP region its runners operate in, the corporate entity owning the platform, its encryption keys, and its customer data is a US legal person subject to US federal law.


The CLOUD Act: What It Means for CircleCI Users

The Clarifying Lawful Overseas Use of Data Act (18 U.S.C. § 2713), enacted in 2018, requires US-incorporated companies to produce customer data in response to a valid US government order regardless of where the data is physically stored. The CLOUD Act explicitly overrides data localisation arguments — storing your CircleCI data in the EU West (Ireland) region does not remove it from CLOUD Act reach.

For a CI/CD platform like CircleCI, the CLOUD Act exposure is especially significant because of what CI/CD pipelines routinely process:

What CircleCI Holds That Is CLOUD Act-Compellable

Data typeCircleCI exposure
Source codeFull repository clones run in every pipeline job
Environment variablesDatabase passwords, API keys, payment credentials, OAuth secrets
Deployment credentialsAWS IAM keys, GCP service account JSON, Kubernetes kubeconfig
Test artefactsCoverage reports, screenshots, logs, compiled binaries
SSH keysHost keys for deployment targets
Docker registry credentialsPrivate container registry authentication tokens
Third-party API tokensStripe, Twilio, SendGrid, Segment, and hundreds more

A single US government order served on CircleCI, Inc. could compel production of all of these credential classes for a target customer without the customer being notified.


The January 2023 CircleCI Breach: CI/CD Secrets as High-Value Targets

The CLOUD Act is a legal risk. What happened in January 2023 demonstrated that CI/CD secrets are also a direct operational security risk — and that CircleCI's own infrastructure can be the attack vector.

Timeline of the January 2023 Incident

On 4 January 2023, CircleCI published a security incident notice. The full timeline:

DateEvent
December 21, 2022Malware installed on a CircleCI engineer's laptop via a compromised session token
December 21–January 4Attackers used the session token to access CircleCI's internal systems and exfiltrate customer data
January 4, 2023CircleCI notified customers of the breach
January 13, 2023CircleCI published the full incident report

What Was Stolen

CircleCI confirmed that attackers accessed and exfiltrated:

The scale of potential exposure was enormous. CircleCI advised all customers to rotate every secret stored in CircleCI immediately — API keys, OAuth tokens, deployment credentials, database passwords. Any customer who had stored production secrets in CircleCI environment variables was potentially compromised.

Why This Matters for GDPR and EU DevOps

The 2023 breach illustrates a structural risk of hosted CI/CD: the platform operator's own infrastructure security becomes your attack surface. Under GDPR:


CircleCI's EU Data Region: What It Does and Doesn't Solve

CircleCI offers an EU deployment option that runs pipeline jobs in AWS eu-west-1 (Ireland). This addresses data residency — the physical location of data at rest — but does not address:

  1. CLOUD Act jurisdiction — CircleCI, Inc. (Delaware) remains the data controller; US compulsion orders apply
  2. Corporate control — CircleCI, Inc. holds the master encryption keys regardless of runner region
  3. Support access — CircleCI engineering and support teams in the US can access customer environments under US employment jurisdiction
  4. M&A risk — if CircleCI is acquired by a US company (or already has US VC board control), the corporate jurisdiction does not change

The EU deployment option is a data localisation measure, not a data sovereignty measure. For GDPR Art. 44 transfers analysis purposes, the data remains under the control of a US entity.


EU-Native CI/CD Alternatives to CircleCI

1. GitLab CI/CD (GitLab B.V., Amsterdam, Netherlands)

GitLab is the most mature EU-native CI/CD alternative to CircleCI. The company behind GitLab is GitLab B.V., incorporated in the Netherlands (Amsterdam). For GDPR purposes, GitLab B.V. is subject to Dutch law and the Dutch Data Protection Authority (Autoriteit Persoonsgegevens — AP), not US federal jurisdiction.

GitLab.com (SaaS):

GitLab Self-Managed (recommended for EU compliance):

FeatureCircleCIGitLab Self-Managed
Publisher jurisdictionUS (Delaware)EU (Netherlands)
CLOUD Act appliesYesNo (self-hosted: your jurisdiction)
Secrets managementCircleCI-managedYour infrastructure
Breach historyJanuary 2023No comparable hosted breach
Orbs/Templates1,000+ orbs1,000+ component catalog entries
Docker layer cachingYesYes
Test splittingYesYes
GitLab integrationNative (GitHub integration)Native (built-in)

GitLab corporate structure:

For EU organisations, self-hosted GitLab (Community Edition — open source; Enterprise Edition for advanced features) provides CI/CD that runs entirely within EU jurisdiction with no CLOUD Act exposure.


2. Woodpecker CI (Open Source, Self-Hosted)

Woodpecker CI is an open-source CI/CD system forked from the original Drone CI codebase. It is maintained by a community of contributors with no single corporate parent — the project is hosted on GitHub under the Apache 2.0 licence.

Why Woodpecker CI for EU compliance:

Limitations vs. CircleCI:


3. Forgejo + Forgejo Actions (Codeberg e.V., Berlin, Germany)

Forgejo is an open-source Git platform (fork of Gitea) maintained by Codeberg e.V. — a German non-profit association registered in Berlin. Codeberg hosts the Codeberg.org public instance; organisations can self-host Forgejo.

Forgejo Actions (introduced in Forgejo 7.0) provides GitHub Actions-compatible CI/CD using the same YAML syntax as GitHub Actions — making migration from GitHub Actions (and by extension, CircleCI) simpler.

Corporate structure of the publisher:

For EU compliance:


4. JetBrains TeamCity (JetBrains s.r.o., Prague, Czech Republic)

JetBrains is a Czech software company (IntelliJ IDEA, PyCharm, Kotlin). JetBrains s.r.o. is incorporated in the Czech Republic. TeamCity is their CI/CD product, available as TeamCity Cloud (SaaS) and TeamCity On-Premises (self-hosted).

DimensionDetail
PublisherJetBrains s.r.o.
IncorporationCzech Republic (Prague)
EU jurisdictionYes — Czech Republic, ÚOOÚ (Office for Personal Data Protection)
CLOUD Act appliesNo (Czech entity, no US parent)
TeamCity Cloud regionsUS, EU (Amsterdam)
On-Premises optionYes — self-host on EU infrastructure

Note on ownership: JetBrains is wholly owned by Sharovenkov Holdings Ltd. (Cyprus) which is owned by the two Russian founders. As of 2022, JetBrains has restructured its holding structure. For GDPR purposes the relevant entity remains the Czech s.r.o. For risk-averse EU organisations, TeamCity On-Premises eliminates any third-party hosting risk.


5. Concourse CI (Open Source, Self-Hosted)

Concourse CI is an open-source continuous thing-doer (their description) built around the concept of pipelines as code. Originally developed by Pivotal (now part of Broadcom), Concourse is now a community-maintained CNCF project.


6. Tekton Pipelines (CNCF, Self-Hosted)

Tekton is a cloud-native CI/CD framework running on Kubernetes. It is a CNCF (Cloud Native Computing Foundation) project — a Linux Foundation hosted project with no single corporate owner.


CircleCI vs EU Alternatives: GDPR Compliance Comparison

FactorCircleCIGitLab Self-ManagedWoodpecker CIForgejo ActionsJetBrains TeamCity
Publisher countryUSA (Delaware)Netherlands (B.V.)Open sourceGermany (e.V.)Czech Republic
CLOUD Act appliesYesNo (self-hosted)NoNoNo
2023 breach historyYesNo equivalentNoNoNo
Secrets custodyCircleCI platformYour infrastructureYour infrastructureYour infrastructureYour infrastructure
GDPR Art. 44 transfer riskHighNone (self-hosted)NoneNoneLow (EU entity)
EU DPA authorityNone (US company)AP (Netherlands)N/ABFDI (Germany)ÚOOÚ (Czech)
Managed cloud optionYes (EU region)GitLab DedicatedNoCodeberg.orgTeamCity Cloud (EU AMS)
Self-hosted optionNoYesYesYesYes
GitHub Actions YAML compatNoPartialNoYes (Forgejo Actions)No

The Secrets Management Problem: Why CI/CD Jurisdiction Matters More Than Compute

For many cloud services, CLOUD Act risk is primarily about data at rest — customer records, documents, files. For CI/CD platforms, the risk profile is different and more acute.

CI/CD pipelines are credential aggregators. A single CircleCI project typically holds:

This means a CLOUD Act order served on CircleCI, Inc. could expose the entire credential estate of a customer organisation — not just the source code, but every service that code deploys to or integrates with.

The January 2023 breach made this concrete: attackers who gained access to CircleCI's internal systems could access encrypted secrets and the keys to decrypt them for every CircleCI customer. The breach response required companies to rotate every secret stored in CircleCI — a major operational incident that affected thousands of development teams globally.


Migration Path from CircleCI to GitLab CI

For EU development teams migrating from CircleCI to GitLab CI, the conceptual mapping is:

CircleCI conceptGitLab CI equivalent
.circleci/config.yml.gitlab-ci.yml
JobsJobs
WorkflowsPipelines with needs: dependencies
OrbsComponents (GitLab Component Catalog) or includes
Environment variablesCI/CD Variables (project/group/instance level)
ContextsProtected/masked CI/CD Variables, Group Variables
ExecutorsDocker, shell, Kubernetes, or custom runners
Cachingcache: keyword with S3 or local cache
Artefactsartifacts: keyword
Parallelismparallel: keyword

GitLab CI uses a declarative YAML syntax that is structurally similar to CircleCI. A typical CircleCI config with build, test, and deploy stages maps directly to a GitLab CI pipeline with equivalent stages.


What EU Organisations Should Do Now

  1. Audit CircleCI secret inventory — list every environment variable and context stored in CircleCI; evaluate which credentials have production access
  2. Assess GDPR data processor risk — if your CircleCI pipelines process personal data (user databases, analytics, logs), CircleCI is a GDPR data processor; ensure your DPA is current and evaluate CLOUD Act transfer risk
  3. Consider self-hosted GitLab or Woodpecker CI for pipelines that process the most sensitive credentials (production database passwords, payment credentials)
  4. Rotate credentials if you have not done so since the January 2023 breach
  5. Evaluate GitLab Dedicated EU if you want managed CI/CD with EU data residency and EU corporate control

Deploy Your EU-Compliant CI/CD on EU Infrastructure

If you are migrating to self-hosted GitLab, Woodpecker CI, or Forgejo, you will need EU-based infrastructure to run your CI/CD platform. sota.io provides EU-native managed hosting on Hetzner Germany — no US parent, no CLOUD Act exposure, and straightforward deployment for containerised applications including GitLab Runners and Woodpecker CI agents.

Deploy your EU-sovereign DevOps stack from €9/month. All data stays in Germany.


Next in the EU DevOps Tools Series: Jenkins EU Alternative 2026 — Apache Software Foundation (US 501(c)(3)), self-hosted angle, and the "open source is CLOUD Act-free" analysis.

EU-Native Hosting

Ready to move to EU-sovereign infrastructure?

sota.io is a German-hosted PaaS — no CLOUD Act exposure, no US jurisdiction, full GDPR compliance by design. Deploy your first app in minutes.