Security and Privacy
Forge was built with the principle that powerful analytics shouldnβt compromise safety. Whether youβre using the hosted version or running a self-hosted deployment, Forge is designed to respect user privacy, protect data, and avoid exploitative behavior.
This page explains how Forge handles on-chain data, user interactions, and external integrations while maintaining a secure and transparent environment.
π What Forge Does Not Do
Forge does not front-run trades
Forge does not auto-execute transactions
Forge does not store private keys or wallet seed phrases
Forge does not monitor or retain personal DMs or Telegram content
Forge does not use AI to generate fake token activity or bots
Everything Forge analyzes is based on publicly available, on-chain activity and open-access social metadata (when provided by token deployers or visible in groups).
π‘ On-Chain Data Access
Forge only listens to:
Token launches
Wallet transfers
Liquidity pool actions
Contract metadata
Public Telegram wallet joins (where possible)
All data is processed in-memory or cached securely. No sensitive information is harvested, injected, or stored outside whatβs already public on Solana.
π§ Language Model Handling
If you're using the hosted version:
Prompts are processed through OpenAI (GPT) or Anthropic (Claude) via encrypted API
No wallet data or secrets are sent
Context is sanitized before model input
Forge does not allow external models to store chat history or track identities
In self-hosted setups:
You choose your own model endpoint
You retain full control of prompt formatting, token usage, and inference logs
π User Session Data
In the hosted UI, Forge temporarily stores:
Session chat history
Agent response logs
Follow-up action context
This is session-scoped and can be cleared or disabled entirely.
For teams or DAOs, shared instances can be configured with role-based access and separate workspaces.
π API Security
When using external APIs (Telegram, Twitter, etc.):
All keys are stored in environment variables (
.env
)No keys are injected into AI prompts
API usage is rate-limited and scoped to read-only endpoints
If keys are compromised, Forge fails safe and disables related modules
You should never expose Telegram bot tokens or trading keys directly in any agent logic.
π‘ Safe Usage Guidelines
To keep your Forge instance secure:
Never use or connect private keys to Forge
Host behind HTTPS with rate limiting if public
Use .env secrets and never hardcode sensitive data
Regularly update from upstream if you forked
Monitor logs for excessive API hits or unexpected prompts
If you're building your own commercial version, consider adding login, wallet auth, or workspace isolation layers.
Last updated