Zero-Exposure Security
AI API Key Protection Policy
Client-Side Isolation
Your actual API KEY is never included in browser network communication. All requests are handled using unique Config IDs, and the KEY stays only within the secure server environment.
End-to-End Encryption
From the moment you enter your API KEY until it is stored in our secure server vault, every step is encrypted. Only values encrypted with the AES-256-GCM algorithm are stored in the database, and the original KEY exists only temporarily in memory before being immediately destroyed.
Server-Side Execution
AI content generation is performed only on the server-side. Communication with external AI services also goes through secure servers, eliminating the risk of key leakage from your local environment.
Identity & Abuse Protection
We operate a real-time Rate Limiting system to prevent brute-force attacks and abuse by automated bots. All activities undergo rigorous authentication, and any attempt to manipulate others' data is blocked at the system level.