Transparency report for FORGE v4.2.0
Audit completed on February 4, 2026
FORGE is built with security as a core principle. We understand that you're trusting us with your development workflow, and we take that seriously.
All API keys use environment variables
No eval(), no obfuscated code, no suspicious network calls
FORGE does not send your code or data to external servers
All code is readable and auditable
No known vulnerable packages
FORGE does not collect usage data
We don't track what you build
Your .env.local stays on your machine
Your projects are never uploaded
Buyers get pull (read) permission only
FORGE cannot modify your existing code
Remove yourself from the repo anytime
All templates use proper escaping
Parameterized queries in all database code
Built into generated Next.js apps
Security headers configured by default
Zod schemas for all form inputs
Git-ignored by default
xxx placeholders, not real keys
Keys entered directly into .env.local
Your secrets are never logged or displayed
This security audit was conducted using the following methods:
Found a security vulnerability? We take all reports seriously.
Contact us directly on Twitter/X (@Agentik_os) via DM for responsible disclosure. We'll respond within 24 hours.