๐Ÿ›ก Security & Trust

Your API keys are safe with us

We need read-only access to pull usage and cost data from your providers. Here is exactly what we access โ€” and what we never touch.

๐Ÿ”’

AES-256 Encrypted

๐Ÿ‘

Read-Only

๐Ÿšซ

No Inference Use

๐Ÿ” How we protect your keys

๐Ÿ”’

AES-256-GCM ใงๆš—ๅทๅŒ–ใ—ใฆไฟๅญ˜

APIใ‚ญใƒผใฏใƒ‡ใƒผใ‚ฟใƒ™ใƒผใ‚นใซไฟๅญ˜ใ•ใ‚Œใ‚‹ๅ‰ใซๆš—ๅทๅŒ–ใ•ใ‚Œใพใ™ใ€‚ๆš—ๅทๅŒ–ใ‚ญใƒผใฏ็’ฐๅขƒๅค‰ๆ•ฐใซใฎใฟๅญ˜ๅœจใ—ใ€ใ‚ขใƒ—ใƒชใ‚ฑใƒผใ‚ทใƒงใƒณใ‚ณใƒผใƒ‰ใซใฏๅซใพใ‚Œใพใ›ใ‚“ใ€‚

๐Ÿ‘

่ชญใฟๅ–ใ‚Šๅฐ‚็”จใƒปใƒขใƒ‹ใ‚ฟใƒชใƒณใ‚ฐ็”จ้€”ใฎใฟ

ไฝฟ็”จ้‡ใƒป่ซ‹ๆฑ‚ใ‚จใƒณใƒ‰ใƒใ‚คใƒณใƒˆใฎใฟใ‚’ๅ‘ผใณๅ‡บใ—ใพใ™ใ€‚ใŠๅฎขๆง˜ใฎใ‚ขใ‚ซใ‚ฆใƒณใƒˆใธใฎๆ›ธใ่พผใฟใƒปไฝœๆˆใƒปๅค‰ๆ›ดใฏไธ€ๅˆ‡่กŒใ„ใพใ›ใ‚“ใ€‚

๐Ÿšซ

AIใฎๆŽจ่ซ–ใ‚„ใƒ—ใƒญใƒณใƒ—ใƒˆ็”Ÿๆˆใซใฏไฝฟ็”จใ—ใชใ„

ใŠๅฎขๆง˜ใฎAPIใ‚ญใƒผใฏใ€ใƒขใƒ‡ใƒซใฎๅฎŸ่กŒใƒปใ‚ณใƒณใƒ†ใƒณใƒ„็”Ÿๆˆใƒปไฝฟ็”จ้‡ใƒ‡ใƒผใ‚ฟๅ–ๅพ—ไปฅๅค–ใฎใ‚ฏใ‚ฉใƒผใ‚ฟๆถˆ่ฒปใซใฏ็ตถๅฏพใซไฝฟ็”จใ—ใพใ›ใ‚“ใ€‚

๐Ÿ“‹

ใ™ในใฆใฎใ‚ขใ‚ฏใ‚ปใ‚นใ‚’ใƒญใ‚ฐใจใ—ใฆ็ขบ่ชๅฏ่ƒฝ

KonsumpsyใŒใ„ใคใ‚ญใƒผใซใ‚ขใ‚ฏใ‚ปใ‚นใ—ใŸใ‹ใฏใ€ใ‚ตใƒผใƒ“ใ‚น่ฉณ็ดฐ็”ป้ขใฎใ€Œใ‚ญใƒผใ‚ขใ‚ฏใƒ†ใ‚ฃใƒ“ใƒ†ใ‚ฃใ€ใ‚ฟใƒ–ใง็ขบ่ชใงใใพใ™ใ€‚

๐Ÿ—‘

ใ„ใคใงใ‚‚ๅ‰Š้™คใƒปๅˆ‡ๆ–ญๅฏ่ƒฝ

ใ‚ตใƒผใƒ“ใ‚นใ‚’ๅ‰Š้™คใ™ใ‚‹ใจใ€ใ‚ญใƒผใฏใŸใ ใกใซใƒ‡ใƒผใ‚ฟใƒ™ใƒผใ‚นใ‹ใ‚‰ๆถˆๅŽปใ•ใ‚Œใพใ™ใ€‚ไฟๆŒใƒปใ‚ขใƒผใ‚ซใ‚คใƒ–ใฏ่กŒใ„ใพใ›ใ‚“ใ€‚


โœ… What we access

  • โ—†Daily and monthly token usage totals
  • โ—†Model-level usage breakdown (e.g. GPT-4o vs GPT-4o-mini)
  • โ—†Estimated API cost based on public pricing
  • โ—†Organization-level aggregated usage only โ€” never individual request content

๐Ÿšซ What we never access

  • โœ•Your prompts, messages, or conversation content โ€” ever
  • โœ•AI inference or generation โ€” we never call completions or chat endpoints
  • โœ•Your credit card or billing information
  • โœ•Other workspaces or organizations you belong to
  • โœ•Individual API call logs or request-level details

๐Ÿ“‹ Key activity log

Every time we use your key, it is logged with a timestamp, endpoint, and outcome. You can review this log anytime from the service detail page.

  • โ—†Logged: timestamp, provider, endpoint, action type, success or error
  • โ—†Key values are never written to logs โ€” only metadata
  • โ—†Auto-sync runs once per day at 02:00 UTC
  • โ—†Manual sync available anytime on Pro and Team plans

๐Ÿ‘ค You are always in control

  • โ—†Disconnect any service at any time โ€” key is removed immediately
  • โ—†Rotate or update a key anytime without losing usage history
  • โ—†Request full account deletion via support

๐Ÿ“„ Our commitments

  • โ—†Keys are used only to read usage and cost data โ€” nothing else
  • โ—†Keys are never sold, shared, or transferred to any third party
  • โ—†Your data belongs to you โ€” we do not aggregate or resell it
  • โ—†GDPR deletion requests fulfilled within 30 days

Questions about security?

We are transparent about everything. Reach out anytime.

Contact us โ†’