We currently support the following versions with security updates:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Important: Never commit API keys or sensitive credentials to the repository.
- All API keys are stored in environment variables
- The
.gitignorefile excludes all.env*files - Use
.env.localfor local development (this file is gitignored) - Use
.env.exampleas a template (this file is safe to commit)
The following environment variables are used:
NEXT_PUBLIC_GEMINI_API_KEY- Google Gemini API key (required)MCP_SERVER_URL- Optional MCP server URLMCP_API_KEY- Optional MCP server API key
Note: While NEXT_PUBLIC_GEMINI_API_KEY has the NEXT_PUBLIC_ prefix, it's actually used server-side only. Consider renaming it to GEMINI_API_KEY in future versions for clarity.
- Never commit
.env.local: This file contains your actual API keys - Use environment-specific files:
.env.development.local,.env.production.local - Rotate keys regularly: If a key is exposed, rotate it immediately
- Use secrets management: For production, use proper secrets management (Vercel, AWS Secrets Manager, etc.)
If you discover a security vulnerability, please:
- Do NOT open a public issue
- Email security concerns to: [your-email@example.com]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and work with you to address the issue.
Before deploying:
- No API keys in code
- All
.env*files in.gitignore - Environment variables properly configured
- Dependencies up to date (
pnpm audit) - No sensitive data in logs
- CORS properly configured
- Input validation in place
Regularly update dependencies:
pnpm audit
pnpm update- A2UI Builder processes UI descriptions locally
- No user data is stored permanently (all in-memory)
- API calls to Gemini are made server-side
- No tracking or analytics by default
- Google Gemini API: Used for AI generation. Review their privacy policy
- shadcn/ui: Open-source component library
- Vercel: If deploying to Vercel, review their security practices
Last updated: 2024