⚠️ Research Preview — Deli is in active development and has not undergone a third-party security audit. Do not store production API keys with spending authority. Use test keys or keys with low rate limits while we harden the platform.

Roadmap

Deli is in active development. Here’s a transparent look at what’s shipped, what’s coming next, and where we’re headed.

20
Shipped
6
Coming Soon
9
Planned

Update Log

Transparency matters. Here’s what we’ve shipped recently.

2026-03-01

Local Proxy, Credential Shares & Security Hardening

  • deli serve — local HTTP proxy server: agents use placeholder tokens, real credentials injected at network layer only for allowlisted hosts
  • Credential shares — time-limited, scoped access tokens for stored credentials. Expiry options: 15m, 1h, 24h, 7d, 30d. Optional one-time-use and password protection.
  • Fixed 3 CRITICAL security findings: framework token secret now fails hard at startup in production, wallet address derivation now uses ethers.js, proxy-chat async error boundary added
  • deli share CLI command — generate shareable credential URLs from the terminal
  • Open source reference integration: deli-agent-sandbox demonstrating OpenCode + Gondolin + Deli secure agent stack
2026-02-20

Security Hardening — Tier 1 & 2

  • Completed comprehensive internal security audit across credential lifecycle, transport, session management, and access control
  • Fixed all critical and high-severity findings — 27 of 31 total issues resolved
  • OAuth tokens now stored as SHA-256 hashes instead of plaintext
  • Added session regeneration on login to prevent session fixation
  • CSRF protection strengthened — requires Origin or Referer header for cookie-authenticated requests
  • Per-token rate limiting hardened with independent limits per OAuth token
  • Portal security headers added: CSP, HSTS with preload, X-Frame-Options, Permissions-Policy
  • Admin and migration endpoints gated behind environment flags
  • Atomic credit deduction to prevent race conditions
  • bcrypt salt rounds increased to OWASP-recommended levels
2026-02-19

Zero Retention Mode & Governance

  • Shipped Zero Retention mode — users can opt out of proxy metadata logging
  • Governance API, SDK methods, and CLI commands for per-user configuration
  • Only minimum billing data retained when Zero Retention is active
  • Database migration for governance tables deployed
2026-02-18

Response Sanitization & Rate Limits

  • Added response content sanitization on proxy to defend against prompt injection from upstream APIs
  • Per-token rate limiting — each OAuth bearer token is independently rate-limited
  • Enhanced security headers: HSTS, strict CSP on API responses
  • Secure credential wiping after proxy use
2026-02-15

Per-Account Encryption & KMS

  • AWS KMS integration for envelope encryption — master keys never leave KMS
  • Per-account key derivation using PBKDF2 — each developer account has isolated encryption
  • Research preview warning banner added to portal
2026-02-10

Portal Redesign & Documentation

  • Pop art design system shipped across all portal pages
  • Complete API documentation with 40+ endpoints
  • Team page with updated bios and photography
  • Typography upgrade to Space Grotesk + JetBrains Mono

Core Infrastructure

OAuth 2.0 Authorization Server

Shipped

RFC 6749-compliant with PKCE enforcement (RFC 7636), authorization code flow, token revocation (RFC 7009), and server metadata (RFC 8414). Full E2E flow verified on production.

AES-256-GCM Credential Encryption

Shipped

API keys encrypted at rest with unique random IV per key. Authentication tags for integrity verification. Decrypted only in-memory during proxy forwarding.

API Proxy Service

Shipped

Secure request forwarding to OpenAI, Anthropic, Stripe, and GitHub. Real-time key decryption, complete request/response logging, and usage tracking.

Row-Level Security & Audit Logging

Shipped

RLS enabled on credential tables. Security audit log tracks all credential access events with actor, target, and metadata.

Tiered Rate Limiting

Shipped

Four-tier rate limiting: auth (10/15min), general (100/15min), proxy (60/min), token (20/15min). Per-token rate limiting added — each OAuth token is independently rate-limited (30 req/min, configurable) to contain impact of compromised tokens.

Webhook System

Shipped

Real-time event delivery with HMAC SHA-256 signature verification and timing-safe comparison. Configurable per application.

Per-Account Encryption Keys

Shipped

PBKDF2-derived unique encryption keys per developer/user account, replacing the single global key. All credential paths (identity mappings, app services, user keys) use account-isolated encryption.

Zero Retention Mode

Shipped

Per-user governance mode that strips all non-billing metadata from proxy logs. Only minimum billing data (userId, timestamp, tokenCount, provider) is retained. Configurable via API, SDK, and CLI.

Developer Tools

withdeli-cli (v0.1.0)

Shipped

Published on npm. Agent-based authentication, direct API calls through proxy, and local configuration management.

@deli/sdk

Shipped

TypeScript SDK with OAuth 2.0 PKCE client, service-specific helpers (OpenAI, Anthropic, Stripe, GitHub), and proxy API client. Defaults to production.

Agent Authentication

Shipped

client_credentials grant for AI agents. Scoped tokens, full audit trail, secret rotation, and per-agent deactivation.

Governance API & CLI

Shipped

Configure data retention mode per user via REST API, SDK methods (governance.configure, governance.status), and CLI commands (deli governance set/status).

deli serve — Local Proxy

Shipped

Run a local HTTP proxy server that intercepts agent requests and injects real Deli credentials. Agents set a placeholder token; the proxy swaps it for the real credential before forwarding to api.withdeli.com. Host allowlist enforced — requests to non-configured services are blocked. No VM or QEMU required.

Credential Shares

Shipped

Time-limited, scoped access tokens for stored credentials. Generate a shareable URL with configurable expiry (15m to 30d), optional one-time-use, and optional password protection. Full audit trail on redemption.

Portal & Documentation

Developer Portal

Shipped

App management (CRUD), agent management with scoped credentials, analytics dashboard with 30-day historical data, credential identity mappings.

User Portal

Shipped

API key storage per service (OpenAI, Anthropic, Stripe, GitHub), authorization review and revocation, activity monitoring, account settings.

API Documentation

Shipped

8-section docs with sidebar navigation covering 40+ endpoints, OAuth flow, proxy usage, SDK, and agent authentication.

Onboarding Email Sequence

Coming Soon

Drip campaign for new developer sign-ups to drive activation. Resend integration is in place.

Portal Route Protection

Shipped

Middleware-enforced routing boundaries between developer and user portals. Unauthenticated requests are redirected to the appropriate login page.

Separate Portal Domains

Planned

Distinct entry points for developer and user portals, currently sharing a domain.

Billing & Metering

Credit-Based Billing

Coming Soon

Prepaid credit packs via Stripe Checkout. Credits deducted per proxy call based on token usage. Balance tracking and transaction history.

Usage Metering

Coming Soon

Per-token cost tracking across all providers. Real-time balance updates after each proxied request.

Spending Controls

Planned

Configurable budget limits and alerts per app or agent. Auto-pause when limits are reached.

Blockchain & Payments

ERC-8004 On-Chain Identity

Planned

Link Ethereum addresses to agents for verifiable on-chain identity across EVM-compatible chains.

x402 Per-Call Payments

Planned

Cryptocurrency-based micro-transaction billing for proxied API calls. Architecture designed; awaiting ecosystem maturity.

Multi-Chain Support

Planned

Expand on-chain identity and payment support beyond Ethereum to additional chains.

Enterprise Features

Team Management

Planned

Multi-user developer accounts with role-based access control for apps and agents.

Enterprise SSO

Planned

SAML/OIDC single sign-on integration for enterprise developer accounts.

Additional API Providers

Planned

Expand the proxy to support more services beyond the current four.

Quality & Security

Security Audit & Tier 1 Hardening

Shipped

Comprehensive internal security audit across 8 categories: memory safety, transport security, sanitization, isolation, rate limiting, key derivation, TEE readiness, and forensics. Tier 1 fixes shipped: response sanitization, per-token rate limits, enhanced headers, secure memory clearing.

Critical Security Fixes — Tier 2

Shipped

Framework token secret now fails hard at startup in production environments (no insecure fallback). Wallet address derivation corrected to use ethers.js (previous implementation derived incorrect addresses). Proxy-chat async error boundary added to prevent silent unhandled rejections.

Automated Test Suite

Coming Soon

Comprehensive Vitest coverage targeting 30%+ across API endpoints, OAuth flows, and proxy logic.

Anomaly Detection

Coming Soon

Baseline behavior tracking per agent with real-time deviation alerts. Flags unusual service switching, abnormal request volumes, and other compromise indicators.

Tamper-Evident Audit Logging

Coming Soon

Cryptographically signed audit events stored in append-only format. Log integrity verification endpoint. Database compromise cannot silently falsify the audit trail.

Third-Party Security Audit

Planned

External penetration test and audit of the full credential proxy stack.

Have a feature request or want to follow along?