Transient
Operations

Security & Boundaries

What is documented, what is protected, and how to handle secrets and data safely in your integration.

Documentation boundary

This documentation follows a strict black-box policy. It covers only what you need to integrate reliably. Proprietary internals are intentionally excluded.

What we document

Public integration surface

  • API and MCP usage contracts
  • Required inputs and expected outputs
  • Authentication patterns
  • Actionable error codes
  • Rate limits and credit model
  • Data retention policy

What we protect

Proprietary internals — not disclosed

  • Model architecture and algorithmic design
  • Internal pipeline and reasoning steps
  • Evidence extraction methodology
  • Private infrastructure topology
  • Non-public operational endpoints
  • Internal scoring and ranking logic

Authentication

All API endpoints authenticate via the x-api-key header. Keys are scoped to your account and tied to your credit balance.

Required header
x-api-key: your_ti_api_key

Never expose keys client-side

API keys must only be used from server-side environments. Never include them in browser-executed code, frontend bundles, or public repositories.

Use environment variables

Inject TI_API_KEY at runtime. Keep .env files in .gitignore. Use secrets management in CI/CD pipelines.

Rotate when compromised

Revoke and replace the key immediately from /dashboard/developers. Compromised keys should be treated as fully exposed — there is no partial revocation.

Sanitise logs

Do not print the full API key or raw session payloads to stdout in production. Redact keys before logging request headers.

Data retention

Sessions and indexed evidence are retained for a fixed window after upload, then deleted. TI does not store your documents permanently.

DataRetention windowNotes
Indexed session evidence72 hours (default)Configurable via retention_hours on upload. Subject to platform cap.
Raw uploaded filesNot storedFiles are processed in-memory and discarded after indexing.
API audit logsPer privacy policyAnonymised usage metrics only. No document content retained in logs.

Zero data retention guarantee

TI does not use uploaded document content to train models or improve the service. Evidence is isolated per session and deleted at expiry.

Transport security

The following transport types are blocked at the API level. Attempts to use them return unsupported_transport.

/mnt/data/...

Local runtime mount paths (e.g. ChatGPT sandbox, code interpreters)

sandbox:/...

Sandbox-scoped file paths

file://...

Local file URIs

http://...

Non-TLS HTTP URLs (blocked unless explicitly allowed in trusted runtimes)

192.168.x.x / 10.x.x.x

Private network addresses

Use ti_create_upload_handoff for connector environments

If your MCP client only has access to a local mount path, use ti_create_upload_handoff to generate a one-click browser upload URL instead of attempting to pass the local path directly.