Overview
Security is a core priority for CaptureAPI.
Our infrastructure and systems are designed to ensure secure API requests and safe screenshot processing.
Secure API access
All API requests require authentication using a unique API key.
API keys should be kept confidential and never exposed publicly.
Encryption
All communication with CaptureAPI is encrypted using HTTPS / TLS encryption.
Isolated rendering environment
Screenshots are generated using isolated browser environments to prevent cross-request interference.
Data protection
We follow industry-standard practices to protect infrastructure and user data.
Infrastructure security
CaptureAPI runs on secure cloud infrastructure with protections including:
- Network isolation
- Firewall protections
- DDoS mitigation
- Access controls
Responsible disclosure
If you discover a security vulnerability, please report it responsibly.
Contact: