We understand the concern: "How do I know you're not stealing my API keys?"
Here's exactly how we protect them.
BYOK (Bring Your Own Keys) means you provide your own API keys from AI providers like OpenAI, Anthropic, Google, or Groq. You pay the providers directly for usage, and you maintain full control over your keys at all times.
BYOK gives you transparency—you pay providers directly and can see exactly what you're spending. Since you own the keys, you can revoke them anytime from your provider's dashboard if needed.
All API keys are encrypted before being stored in our database using AES-256-CBC encryption. Keys are never stored in plain text.
Each organization's API keys are stored with their organization ID and can never be accessed by other tenants. API keys are explicitly marked as "tenant-only" settings that never fall back to global values.
API keys are automatically stripped from all application logs. We use a dedicated LogSanitizer that detects and masks API key patterns before any log entry is written.
When you send a message, our server decrypts your API key in memory, makes an HTTPS call to the AI provider, and streams the response back to you. Your key is never exposed to the browser or cached on disk.
After you save an API key, it's displayed as "***" in the UI. Even organization admins cannot view the actual key — only replace it with a new one. This prevents accidental exposure in screenshots or screen shares.
API keys are encrypted at rest using AES-256-CBC. Database access alone is not enough to read them — decryption requires access to both the database and the application's secret key. For maximum security, consider self-hosting where you control both.
If you ever suspect a security issue, you can immediately revoke your API keys from your provider dashboards (OpenAI, Anthropic, Google, Groq). Since you control the keys at the source, you can cut off access instantly.
Conversation history is stored for your convenience, but we don't use it for training or share it with third parties. API traffic flows directly to providers — we only see metadata needed to route requests appropriately.
Absolutely not. Each organization is completely isolated with its own encrypted settings storage. There is no mechanism for cross-tenant data access in our architecture.
For teams that require maximum control, Lexix supports self-hosted deployment. With self-hosting, all data including encrypted keys remains on your infrastructure. Contact us for enterprise self-hosting options.
Join thousands of teams who trust Lexix with their AI workflows. Your keys, your control, our platform.
Get Started Free