Security
This page describes how AISA handles API requests, data processing, and security at a platform level.
AISA provides unified APIs across multiple AI and data providers, and is designed to minimize data persistence while enabling secure access to upstream services.
Data Processing Model
AISA processes API requests in real time to fulfill user requests.
- Requests are handled synchronously to route calls to the appropriate upstream provider
- Responses are returned directly to the client
- AISA does not use user data for training or analytics
Prompt and Output Retention
AISA follows a no-storage policy for request content.
- Prompts are not stored
- API responses and outputs are not stored
- Request payloads are processed transiently and discarded after the request completes
This applies across all supported APIs, including AI models, embeddings, video, social platforms, web search, scholar, and finance integrations.
Logging and Metadata
AISA may retain limited operational metadata required to operate and protect the platform, such as:
- Request timestamps
- API key identifiers
- Rate-limiting counters
- Error and status information
This metadata:
- Does not include prompts, inputs, or generated outputs
- Is not used for model training or content analysis
API Authentication
All AISA APIs require authentication.
- Access is controlled using API keys
- Each request must include a valid API key
- Requests without valid authentication are rejected
Users are responsible for keeping API keys secure and rotating them as needed.
Transport Security
AISA APIs are accessed over secure network connections.
- API endpoints are served over HTTPS
- Secure transport is required for all requests and responses
Specific protocol versions and cryptographic configurations are managed at the infrastructure level and are not exposed publicly.
Third-Party Providers
AISA integrates with multiple upstream providers to deliver unified access through a single API.
- Requests are forwarded only as necessary to fulfill the API call
- AISA does not persist the request content before or after forwarding
- Data handling by upstream providers is governed by their respective terms and policies
Users should review the policies of underlying providers when required by their use case.
Updated 3 days ago
