Security essentials
Keys and credentials
- Store
PERCEPTRON_API_KEYin secret managers or environment variables. - Rotate keys regularly; delete unused credentials immediately.
- Avoid committing keys to version control—use pre-commit hooks to block secrets.
Data hygiene
- Sanitize prompts and logs to remove PII before persistence.
- Clamp coordinates before storing to prevent overflows:
max(0, min(1000, value)). - Encrypt payloads at rest when exporting JSON to object storage.
Edge deployment
- Use TLS between clients and self-hosted endpoints.
- Lock down firewall rules to trusted IP ranges.
- Rotate
PERCEPTRON_API_KEY/FAL_KEYvia your secret manager, then reload the worker processes so they pick up the new token. - Keep a separate key per device or workload so compromised hardware can be revoked without downtime elsewhere.
Treat annotated examples as sensitive artifacts—they often contain proprietary product imagery. Secure storage and access controls accordingly.