keyquill

Keyquill Privacy Policy

Last updated: 2026-04-21

Keyquill is a family of client-side libraries and a browser extension that lets you use your own LLM API keys without trusting any intermediary server. This policy explains what the Keyquill software does — and, more importantly, what it does not do — with your data.

What we collect

Nothing.

Where your API keys live

Browser extension (keyquill-extension)

Mobile plugin (keyquill-mobile)

Phone Wallet Relay (keyquill-relay)

Who your API keys are shared with

Only the LLM provider you configured (OpenAI, Anthropic, Gemini, etc.).

The first time a web app requests Keyquill access, the extension shows a consent popup asking you to approve that origin. Approved origins are stored in chrome.storage.local and can be revoked at any time from the extension popup.

Permissions used by the browser extension

Permission Why
storage To persist per-origin consent grants (chrome.storage.local) and to hold keys ephemerally (chrome.storage.session).
content_scripts on http://*/* + https://*/* To let the SDK on any web app communicate with the extension via a content-script relay. A page script without our content script cannot call the extension.

We do not request:

Third parties

The only third parties that receive any data are the LLM providers you choose to use. Please review their privacy policies separately.

Contact

Report issues or questions via GitHub: https://github.com/R-Okauchi/keyquill/issues.

Changes to this policy

Material changes will be reflected in the commit history at https://github.com/R-Okauchi/keyquill and noted in the Last updated date above.