AI.duino takes the security of your API keys and data seriously. This document outlines security practices and how to report potential vulnerabilities.
If you discover a security vulnerability in AI.duino, please report it:
- Create a GitHub issue at: https://github.com/NikolaiRadke/AI.duino/issues
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- API keys are stored locally in
~/.aiduino/directory - Files are created with restricted permissions (mode 0600 on Unix/Linux/macOS)
- Keys are never transmitted except to their respective API endpoints
- No analytics or telemetry is collected
- Keys are never logged or exposed in error messages
AI.duino communicates with the following external services (depending on your selected AI provider):
Remote AI Providers:
api.anthropic.com(Claude)api.openai.com(ChatGPT)generativelanguage.googleapis.com(Gemini)api.mistral.ai(Mistral)api.groq.com(Groq)api.perplexity.ai(Perplexity)api.cohere.ai(Cohere)us-central1-aiplatform.googleapis.com(Vertex AI)api-inference.huggingface.co(Hugging Face)
Local AI Providers:
localhost:11434or127.0.0.1:11434(Ollama - if installed locally)- Local Claude Code process (if installed)
- Local Codex CLI process (if installed)
Update Checks:
raw.githubusercontent.com(provider configuration updates only)
- Your code is only sent to the AI provider you selected
- No code is stored on any external servers by AI.duino
- Chat history is stored locally in
~/.aiduino/.aiduino-chats/ - Token usage statistics are stored locally in
~/.aiduino/.aiduino-token-usage.json
- AI.duino does not execute any code automatically
- All code modifications require explicit user confirmation
- The extension runs as part of Arduino IDE 2.x with your user permissions
- No elevated privileges are required or requested
When using local providers (Ollama, Claude Code):
- Communication stays on your local machine
- No external network requests are made
- Your API keys and data never leave your computer
- Never share your API keys - Each user should have their own keys
- Rotate API keys regularly - Especially if you suspect compromise
- Use environment-specific keys - Don't use production keys for development
- Monitor API usage - Check your provider dashboards for unusual activity
- Keep the extension updated - Security fixes are delivered through updates
Security reports are prioritized and will be addressed as quickly as possible. I do my very best to respond within 48 hours.
Security updates are provided for the latest version of AI.duino. Please ensure you're running the most recent release.