Docs

Security you can build on

ModelRiver safeguards provider credentials, API keys, and request data so your team can focus on product.

Current section

Security

Updated

This week

Build time

Minutes, not hours

Shield illustration representing ModelRiver security

API keys

  • Generated keys are shown once and stored as SHA-256 hashes. Keep them in your secret manager.
  • Revoke compromised keys from the dashboard—the invalidation is immediate.
  • Create separate keys per environment or integration for granular control.

Provider credentials

  • Stored provider tokens are encrypted at rest. Values are masked in the UI and never returned once saved.
  • Rotate credentials by overwriting the existing entry or deleting and recreating it.
  • Missing credentials surface clear errors both in the dashboard and API responses.

Authentication & access

  • Dashboard access uses secure session cookies. Invite only trusted teammates.
  • All API requests require a valid Bearer token. Failed attempts return 401 or 403 with guidance.
  • Rate limiting protects the platform from abuse. Contact support if you need higher throughput.

Data retention

  • Request payloads, responses, cached data, and token usage are stored for observability.
  • Purge logs per project if policies require it—contact support for custom retention.
  • Avoid logging sensitive data unnecessarily; use cache fields selectively and redact before sending when required.

Compliance & auditing

  • Every request captures timestamps, providers, models, token counts, and cached metadata for audit trails.
  • Export logs for external archiving or analytics. Integrations with SIEM tools are available on request.
  • Maintain least privilege: issue dedicated API keys for each service or team.

Responsible usage

  • Respect provider terms of service. ModelRiver acts as an orchestrator and does not override vendor policies.
  • Implement user-level rate limits in your application to complement ModelRiver’s platform-wide safeguards.
  • Handle personally identifiable information (PII) in accordance with your regulatory obligations.