ModulesAI ModuleSecurity

Security

Security is foundational to the Antarctica.io AI Module architecture. Adhering to the following principles guarantees zero data leakage while properly interacting with the endpoints.

Data Handling Practices

  • Zero Storage of PII: By default, the /v1/telemetry/usage endpoint avoids logging deeply sensitive contextual inputs strictly if omitted from the io.prompt field.
  • Redaction Required: If you do include the optional io block, you are responsible for sanitizing personally identifiable information (PII) before submission.
  • Encryption at Rest: Any token usage payloads mapped inside Antarctica.io vaults are securely encrypted at rest.

Authentication Security

  • Strict Bearer Implementation: API tokens cannot be transported via query strings; they must adhere to standard Bearer token mechanisms.
  • Automated IP Filtering: Telemetry routes are protected by robust IP filtering constraints matching predefined allowlists inside your unified dashboard.
  • Rotation: Rotate keys frequently using the main Antarctica Web portal if external compromise is suspected.

Recommendations for Production Use

  1. Firewalls & Egress: Ensure outbound rules allow connectivity to standard ports (443) targeting api.antarctica.io.
  2. Dedicated Keys: Issue separate tracking API keys for different staging, QA, and production architectures inside your team.

[!CAUTION] Never print API tokens or response details representing configuration credentials into debug terminal applications outside of isolated sandboxes.