How encryption works
We take the security of your OpenAI requests extremely seriously
What happens to your OpenAI key
When you call a completions request with Valyr's cloud hosted proxy, we get your OpenAI key to execute the query on your behalf. We also hash your key using the cryptographically secure SHA-256 hash function and log the hash with your response.
The first time you login to Valyr's web application, you will enter your OpenAI key. We hash it in your client using the same hash function above and persist only the hash in our server.
This allows the web application to match your completion requests with your account, even though we never know what your key is.
Don't believe us? Check out our open-source code
Valyr is an evolving open source project that is committed to earning the trust of developers. By making our code publicly available, we provide transparency and allow developers to confirm best security practices for themselves and suggest improvements where possible.
Last updated