Issue: Hardcoded Helicone API key was exposed in source code Status: β FIXED - Moved to environment variable configuration
SuperDesign now supports secure API key management through environment variables:
# Copy .env.example to .env and configure:
ANTHROPIC_API_KEY=sk-ant-api03-your-key-here
OPENAI_API_KEY=sk-your-openai-key-here
OPENROUTER_API_KEY=sk-or-your-openrouter-key-here
HELICONE_API_KEY=sk-helicone-your-key-here # Optional- Use Command Palette:
SuperDesign: Configure [Provider] API Key - Settings are stored in VSCode's secure storage
- Never commit API keys to version control
- Use environment variables for production deployments
- Rotate keys regularly and monitor usage
- Use Helicone monitoring to track API usage and costs
- Limit API key permissions where possible
- All file operations are restricted to workspace boundaries
- Path traversal attempts are blocked
- File size limits prevent memory exhaustion
// β
Safe - within workspace
read({ filePath: "src/components/Button.tsx" })
// β Blocked - path traversal
read({ filePath: "../../../etc/passwd" })- Optional monitoring for API usage tracking
- Cost analysis and performance metrics
- Request/response logging for debugging
- No data retention without explicit configuration
- Helicone is optional - extension works without it
- User data is only sent to configured AI providers
- Local storage for designs in
.superdesign/folder - No telemetry sent to SuperDesign servers
If you discover a security vulnerability:
- Do NOT create a public issue
- Email security concerns to the maintainers
- Include detailed reproduction steps
- Allow reasonable time for response
# Minimal secure configuration
ANTHROPIC_API_KEY=your-key-here
# OR
OPENAI_API_KEY=your-key-here
# OR
OPENROUTER_API_KEY=your-key-here
# Optional monitoring
HELICONE_API_KEY=your-helicone-key-here# Enable additional security features
LOG_LEVEL=warn # Reduce log verbosity
DEV_MODE=false # Disable development features- API keys stored in environment variables
-
.envfile added to.gitignore - No hardcoded credentials in source code
- File operations restricted to workspace
- Regular security updates applied
- Monitoring configured (optional)
This document will be updated as new security features are added or vulnerabilities are discovered.
Last Updated: 2025-01-19 Version: 0.0.11+security-fix