This project uses server-side environment variables for secrets.
Set these in Vercel Project Settings -> Environment Variables:
GEMINI_API_KEYAXIOM_TOKENAXIOM_DATASETMETRICS_ADMIN_TOKEN(recommended if using/api/metricsin production)TRACK_ALLOWED_ORIGINS(optional allowlist for/api/track)
Do not expose these in client-side code or public env prefixes.
Some values are intentionally public (safe to expose in HTML/client):
- Clerk publishable key (
pk_live_...)
Publishable keys are not secrets. Secret Clerk keys should never be put in client code.
- Use
.env.localfor local secrets. .env.localis gitignored and should never be committed.
- Rotate the affected key immediately (provider dashboard).
- Update the rotated value in Vercel env vars.
- Redeploy.
- Invalidate any leaked tokens if possible.