Bindify uses zero-knowledge encryption. We cannot read your credentials — even if we wanted to.
Your OAuth tokens are encrypted using a key that only exists in your secret URL. Bindify never stores the decryption key. If our entire infrastructure were compromised, attackers would get encrypted blobs they cannot decrypt. Here is exactly how it works.
This means:
Your secret URL and API key are shown once when you connect a service. We never display them again because we never store them. If you lose them, you reconnect (a new OAuth flow generates fresh credentials).
In addition to secret URLs, Bindify offers API key authentication for programmatic access and CLI tools like Claude Code.
The API key is derived from the exact same two secrets as the URL. It provides identical zero-knowledge security guarantees:
When to use which:
Both methods are equivalent. Choose whichever fits your client.
Every Bindify connection uses two independent UUID v4 values in the URL path:
To put that in perspective:
All traffic between Claude and Bindify is encrypted with TLS. Your secret URL is never transmitted in plaintext.
Aggressive rate limits on all endpoints. Brute-force enumeration of URLs is computationally impossible and would be blocked long before making progress.
Automated scanning and enumeration attempts are detected and blocked at the edge.
Your OAuth tokens are encrypted at rest using AES-256-GCM with a key derived from your secret URL. The decryption key is never stored by Bindify — it exists only in the URL you control. Even a full infrastructure compromise cannot expose your credentials.
You can revoke any connection instantly from your dashboard. The secret URL stops working immediately. You can also regenerate a new URL at any time.
We do not log, store, or inspect the content of MCP requests or responses. We track only metadata (timestamps, status codes) for monitoring and debugging.
The URL itself is the credential. Treat it like a password:
This is a deliberate trade-off: permanent convenience in exchange for treating a URL as a secret. We believe this is the right trade-off for most users, and it is the same model used by thousands of production APIs and webhooks across the industry.
If you have security concerns or want to report a vulnerability, contact us at [email protected].