Production API key exposed in browser source
Risk
Anyone who views source can copy the key and attempt unauthorized API calls against production services.
Fix
Revoke the exposed key, issue a server-only replacement, move all payment and AI calls behind authenticated server routes, and re-scan after deploy.
