Security & Compliance
Tekimax SDK is designed with a "Secure by Default" philosophy, leveraging modern supply chain security practices to ensure integrity from build to runtime.
Supply Chain Hardening
Chainguard Images
Our runtime and build artifacts are based on Chainguard Images, which are:
- Minimal: Stripped of operating system shell, package managers, and other unnecessary binaries. This eliminates entire categories of exploits (shell injection, privilege escalation via installed tooling).
- Hardened: Designed to reduce the attack surface significantly.
- Zero CVEs: Rebuilt daily to patch upstream vulnerabilities immediately — so you inherit fixes without waiting for a manual image update.
Artifact Signing (Cosign)
All build artifacts are signed using Cosign (part of the Sigstore project). This allows you to verify that the SDK code you are running is exactly what was built by our CI/CD pipeline, with no tampering.
Vulnerability Management
Continuous Scanning (Trivy)
We employ Trivy in our CI/CD pipelines to continuously scan our dependencies and build artifacts for vulnerabilities.
- Frequency: Every commit and nightly schedule.
- Policy: Builds fail immediately if
CRITICALorHIGHvulnerabilities are detected. - Scope: Scans cover both OS-level packages and Node.js/npm dependencies.
Runtime Protection
Type Safety & Validation (Zod)
Unlike standard SDKs, Tekimax enforces strict runtime validation using Zod schemas.
- Spec-Driven: All schemas are generated directly from the OpenAPI specification, ensuring 100% compliance with the API contract.
- Input Validation: Malformed requests are rejected before they leave your application.
- Output Sanitization: Unexpected responses from upstream providers are caught and handled gracefully.
Strict TypeScript Configuration
The SDK is built with the strictest TypeScript settings enabled to prevent common classes of bugs:
strict: true: Enables strict null checks and no implicit any — catchesnull/undefinedbugs at compile time instead of runtime.noUncheckedIndexedAccess: true: Forces developers to handle cases where array/object access might returnundefined. Without this flag,arr[0]has typeT; with it, the type isT | undefined, preventing silent runtime crashes on empty arrays.
Minimal Dependency Footprint
We aggressively minimize third-party dependencies to reduce the potential attack surface. Each dependency is a potential supply-chain vector, so fewer is better.
- Core Runtime:
zod(validation) andeventsource-parser(SSE streaming). - Provider SDKs:
openai,@anthropic-ai/sdk,@google/generative-ai,ollama— one per provider, each an official first-party package. - Zero bloat: No heavy frameworks, lodash, or unused utility libraries.
Configuration Best Practices
Never hardcode API keys. All providers require explicit apiKey parameters — they do not auto-read environment variables. This is intentional: implicit env-var reading can lead to accidental key leakage across environments (e.g., a CI build picking up production keys).
// ✅ Good: Explicit environment variable
const client = new Tekimax({
provider: new AnthropicProvider({
apiKey: process.env.ANTHROPIC_API_KEY!
})
});
// ❌ Bad: Hardcoded secret
const client = new Tekimax({
provider: new AnthropicProvider({
apiKey: "sk-ant-..." // Never do this — it will end up in source control.
})
});