AnonAI requires an API key from your chosen AI provider. Your key is sent directly to the provider with each request and is never stored. Below you'll find instructions for obtaining a key from each supported provider.
Privacy and security are the foundation AnonAI is built on. Here is a full account of the protections in place:
Your prompt data
PII is stripped from your prompt before it ever leaves the application. The AI provider receives only anonymized text — your names, addresses, email addresses, phone numbers, and other identifiers are replaced with opaque tokens and restored locally after the response is received. The provider never sees your raw input.
API keys
Your AI provider API key is used per-request and immediately discarded. It is never written to the database, the session store, or any log file. It exists in server memory only for the duration of the outbound request.
Passwords
Account passwords are hashed using bcrypt with a cost factor of 12 before storage. The original password is never retained. Even in the unlikely event of a database breach, stored hashes cannot be reversed into usable passwords without significant computational effort.
Encryption in transit
All traffic between your browser and the AnonAI server is encrypted via TLS (HTTPS). All outbound requests from AnonAI to AI providers are made over HTTPS. No data travels over unencrypted connections at any point in the request lifecycle.
Encryption at rest
The underlying infrastructure encrypts stored data at rest, including the database and any associated storage volumes. This ensures that physical access to storage media does not expose readable data.
Session security
Sessions are signed with a strong secret, stored server-side in the database rather than in the browser, and scoped with HttpOnly and SameSite=Lax cookie flags. In production, the Secure flag is enforced, meaning session cookies are only transmitted over HTTPS.
Secrets management
Infrastructure secrets — database credentials, session secrets, and API configuration — are managed as environment variables injected at runtime and are never committed to source code or container images. Access to these values is restricted to the runtime environment only.
HTTP security headers
All responses include a strict set of security headers via Helmet.js, including a Content Security Policy that prevents cross-site scripting, X-Frame-Options to block clickjacking, and X-Content-Type-Options to prevent MIME sniffing.
Rate limiting
All endpoints are rate-limited to protect against brute-force and denial-of-service attacks. Authentication endpoints have tighter limits than general API endpoints.
Audit logging
All significant account and prompt actions — logins, registrations, password changes, prompt relays, and deletions — are recorded in an audit log. This provides a traceable record of activity without logging any sensitive values such as passwords or API keys.
[[ANON_EMAIL_A1B2C3D4]]) before the request leaves AnonAI. The provider never sees your raw input. Use the Preview button in the dashboard to see exactly what will be sent before committing.AnonAI's automatic detection covers common PII patterns, but you may have context-specific information — internal project names, custom identifiers, or personal details that don't match a standard pattern — that you still want to protect.
For these cases, use manual selection anonymization in the dashboard:
[[ANON_USER_TOKEN_A1B2C3D4]]).User tokens are highlighted in amber in the preview to distinguish them from automatically detected PII. You can click any user token in the preview to remove it and restore the original text.
User tokens are rehydrated in the AI response just like automatically detected PII — the original text is restored before the response is shown to you.
Yes — as of v2.0, AnonAI exposes a REST API so you can integrate the anonymization and relay pipeline directly into your own code. An active subscription is required.
Getting started
Generate an API key from the API Keys option in the dashboard menu. The key is shown once — store it securely.
Authentication
Pass your key as a Bearer token in the Authorization header on every request.
Endpoints
POST /v1/relay — anonymize and relay a prompt to an AI provider, returning the rehydrated response.
POST /v1/preview — anonymize a prompt without calling any AI provider, useful for testing.
Full documentation is available in API.md in the project repository.
sk-ant-.sk-.AIza. Gemini 2.5 Flash has a generous free tier with rate limits; paid usage is billed through Google Cloud.xai-.gsk_.pplx-.