Wrap your X/Twitter keys in proxy tokens with IP restrictions and instant revocation — prevent unauthorized posts and data scraping.
See how ShieldKey protects your X (Twitter) integration with minimal code changes.
import { TwitterApi } from "twitter-api-v2";
const client = new TwitterApi({
appKey: "abc123...", // ← API Key
appSecret: "def456...", // ← API Secret
accessToken: "ghi789...", // ← Access Token
accessSecret: "jkl012..." // ← all shared with agency
});
await client.v2.tweet("Hello, world!"); import { TwitterApi } from "twitter-api-v2";
// ShieldKey proxies X/Twitter API calls
const client = new TwitterApi(
"sk_shield_t_5c9a..." // ← revocable proxy token
);
// Routes through proxy.shieldkey.io
await client.v2.tweet("Hello, world!"); Disable any team member's access to your X (Twitter) key in one click. No key rotation. No downtime. No re-deploying environment variables.
Set per-token spend caps so a compromised token can't run up your X (Twitter) bill. Get alerts before limits are hit.
Restrict each shield token to specific IPs or CIDR ranges. Even if a token leaks, it's useless from unauthorized networks.
See every API call made through your X (Twitter) key — who made it, when, from where, and what they accessed.
Your X (Twitter) key is encrypted with AES-256-GCM. It's only decrypted in memory during request proxying — never stored in plaintext.
Issue individual shield tokens to each team member. When someone leaves, revoke their token — everyone else keeps working.
Add your X (Twitter) key to ShieldKey's encrypted vault. ShieldKey generates a proxy token (starting with sk_shield_t_) that your team uses instead. Your real AAAA... key stays encrypted and is never exposed to team members.
Yes. Point your twitter-api-v2 SDK at proxy.shieldkey.io and use a shield token instead of your real API key. The SDK works identically — ShieldKey transparently proxies every request.
Revoke their shield token from the dashboard. Your real X (Twitter) key stays active — no rotation, no downtime, no re-deploying secrets across services. Everyone else keeps working without interruption.
ShieldKey's proxy adds less than 25ms at the p50. The proxy decrypts your key in memory, forwards the request, and streams the response back. For most X (Twitter) API calls, this overhead is negligible.
Set up ShieldKey in under 5 minutes. No credit card required.
Start Free