Skip to content

Security

This page summarizes the security expectations that matter to customers. It does not list internal implementation details.

  • The raw API key is shown only once.
  • Revoked keys stop working immediately.
  • Passwords and sessions are handled securely; plaintext secrets are not exposed.
LayerImplementation
TransportAll traffic uses HTTPS
AuthenticationSeparate secure flows for dashboard sessions and API keys
Data isolationAccounts are isolated from each other
Abuse protectionValidation, rate limiting, and misuse controls are applied

Prompt and response bodies are not stored. Only limited metrics needed for usage, billing, and troubleshooting are retained.

For formal legal notices, see the Privacy Policy and the KVKK Disclosure Notice.

Provider keys and user secrets are used only where required. They are not exposed in the frontend, client logs, or user-facing screens.

If you discover a security problem, contact us through our support channels.