Skip to main content

Security essentials

Keys and credentials

  • Store PERCEPTRON_API_KEY in secret managers or environment variables.
  • Rotate keys regularly; delete unused credentials immediately.
  • Avoid committing keys to version control—use pre-commit hooks to block secrets.

Data hygiene

  • Sanitize prompts and logs to remove PII before persistence.
  • Clamp coordinates before storing to prevent overflows: max(0, min(1000, value)).
  • Encrypt payloads at rest when exporting JSON to object storage.

Edge deployment

  • Use TLS between clients and self-hosted endpoints.
  • Lock down firewall rules to trusted IP ranges.
  • Rotate PERCEPTRON_API_KEY/FAL_KEY via your secret manager, then reload the worker processes so they pick up the new token.
  • Keep a separate key per device or workload so compromised hardware can be revoked without downtime elsewhere.
Treat annotated examples as sensitive artifacts—they often contain proprietary product imagery. Secure storage and access controls accordingly.