Back to Documentation

Everyone – Security, privacy, and trust center

Related

Public documentation hygiene

These pages target a broad audience. Do not embed: live API keys, LLM provider secrets, database or Redis connection strings, Clerk or payment-provider live secrets, webhook signing keys, CI or deploy tokens, private production hostnames, customer debate text, or screenshots of real usage. Prefer placeholders and synthetic JSON.

Threat model in plain language

You send topics to LLM providers you configure. Those providers process content under their terms.

What Consilium stores

Hosted deployments typically persist debates and metadata in Postgres; queues use Redis. Self-hosters control both.

Secrets

Never paste keys into public chats. Rotate keys if leaked. Prefer scoped provider keys where available.

Monitoring

Production may use Sentry or similar — check your deployment notice.