Trust

Security

Overview

Security is a core priority for CaptureAPI.

Our infrastructure and systems are designed to ensure secure API requests and safe screenshot processing.

Secure API access

All API requests require authentication using a unique API key.

API keys should be kept confidential and never exposed publicly.

Encryption

All communication with CaptureAPI is encrypted using HTTPS / TLS encryption.

Isolated rendering environment

Screenshots are generated using isolated browser environments to prevent cross-request interference.

Data protection

We follow industry-standard practices to protect infrastructure and user data.

Infrastructure security

CaptureAPI runs on secure cloud infrastructure with protections including:

  • Network isolation
  • Firewall protections
  • DDoS mitigation
  • Access controls

Responsible disclosure

If you discover a security vulnerability, please report it responsibly.

Contact:

security@captureapi.net