Don't let a leaked API key
destroy your month.
CloudSentinel watches your Google Cloud API keys and shuts them down automatically if something looks wrong. Set a limit, we handle the rest.
No credit card. No commitment. Just a conversation.
The Problem
Google Cloud doesn't automatically shut down a leaked key. You have to catch it yourself.
By the time you notice, the damage is already done.
Budget alerts don't stop anything
They send you an email. Hours after the damage is done. There's no built-in way to automatically stop a key that's being abused.
Billing data arrives too late
Google's billing data can lag 4-12 hours. A leaked key can rack up thousands before a single alert fires.
You can't watch your keys 24/7
Attacks happen at night, on weekends, during holidays. Nobody is sitting at a dashboard waiting to manually revoke a key.
Real Incidents
This has happened to real people.
These are real posts from real developers. One leaked key. No automatic kill switch.
How It Works
Set a limit. We watch it. Key gets shut down automatically.
Three steps. Takes about 5 minutes.
Connect your GCP project
Grant CloudSentinel a minimal role inside your project. It can read key info and shut down a specific key — nothing else.
Set a request limit per key
CloudSentinel polls your API usage every minute via GCP Cloud Monitoring. When a key crosses your threshold, revocation is triggered automatically.
Sleep without worrying
The moment a key crosses your limit, we shut it down automatically. You get an email. Your key is already dead. No console login, no manual action, no 3am panic.
How much control do you want?
Automatic Import
Grant minimal read access to automatically import your API keys and fetch usage metrics. One command, zero manual data entry, and you're protected in seconds.
Best for: teams who want the fastest setup
Custom Permissions
Choose exactly which permissions to grant. You can skip read access entirely, enter your key IDs manually, and grant only the permission to revoke keys when triggered.
Best for: security-first teams with strict IAM policies
We can't create keys. Ever.
Our access is intentionally limited to shutting keys down — not creating them. Even if CloudSentinel itself were compromised, an attacker could only remove access, never create new infrastructure in your project. CloudSentinel uses a custom IAM role created exclusively for this purpose — with only apikeys.keys.delete permission. No read access. No create access. The minimum viable permission to do one job: kill a compromised key before the bill arrives.
Why CloudSentinel
Everything you need. Nothing you have to build.
Shuts down the exact key
Not your whole project, not all your keys. Just the one that crossed the limit. Everything else keeps running normally.
Real-time usage monitoring
CloudSentinel polls your API usage metrics directly via GCP Cloud Monitoring — detecting threshold breaches within 1 minute.
We never see your key values
We only work with key IDs and metadata. The actual key value is never exposed to us — that's a technical limitation of GCP, not just a policy we promise to follow.
PRICING
Simple pricing. Cheaper than one bad incident.
Early access members get 50% off their first 3 months. No credit card until we reach out personally.
🎉 Early Access — 50% off first 3 months. Limited to first 100 teams.
Starter
- 3 GCP projects
- 10 API keys monitored
- Automatic revocation
- Email alert on revocation
- Request-based threshold per key
- Revocation history logs
- Priority email support
- Slack + PagerDuty alerts
- Dedicated support
Pro
- 10 GCP projects
- Unlimited API keys
- Automatic revocation
- Email alert on revocation
- Request-based threshold per key
- Revocation history logs
- Priority email support
- Slack + PagerDuty alerts
- Dedicated support
Business
- Unlimited GCP projects
- Unlimited API keys
- Automatic revocation
- Email alert on revocation
- Request-based threshold per key
- Revocation history logs
- Priority email support
- Slack + PagerDuty alerts
- Dedicated support
FAQ
Common questions
We built CloudSentinel for developers who are skeptical by default. Good. Here are the hard questions answered.
Ready to protect your GCP API keys?
Set up in 5 minutes. 14-day free trial. No credit card required.