Safe vibes
Client code runs in a constrained environment.
Vibes run in a safe browser lane so public code cannot casually reach into platform state, cookies, or other private resources.
Security
Runnable software only works in public if people can trust it. Vibecodr tries to make those safety boundaries visible, understandable, and hard to accidentally cross.
Your code runs in the browser in a safe runtime environment. Anything that needs secrets, private tokens, or trusted server access belongs on the backend side instead of hiding inside the vibe.
The promise is not that public code becomes harmless by vibes alone. The promise is that dangerous capability is kept behind clearer boundaries.
Safe vibes
Vibes run in a safe browser lane so public code cannot casually reach into platform state, cookies, or other private resources.
Trusted Pulses
Secrets, integrations, and server-side operations belong in Pulses, where access can be controlled and reviewed.
Policy by default
Network access, embedding, and other sensitive paths are constrained on purpose so projects do not wander into unsafe territory by accident.
Response
Moderation, telemetry, and enforcement exist so the platform can react when something harmful, deceptive, or clearly unsafe shows up.
Browser runtime, Pulse execution, secrets, embeds, moderation, and telemetry each carry different risk. This page keeps those differences visible instead of smoothing them into trust theater.
Capability mediation
That keeps the public runtime predictable instead of letting random code negotiate its own rules on the fly.
Secret handling
If a project needs private tokens or protected APIs, the safe pattern is to keep that logic in Pulses instead of pushing it into browser code.
Consistency
Feed pages, player pages, docs, and embeds should not quietly switch to a weaker safety story just because the context changed.
Safety and growth
People should be able to experiment freely without having to become security experts before they share what they made.
Security has product language here, but the linked docs and policies are where the exact behavior lives.
Short answers for the places where marketing copy should stop hand-waving and say the plain thing.
No. Vibes are client-side and constrained. Trusted resources should be accessed through controlled backend paths in Pulses.
Because that separation keeps the public part easier to trust and makes it much harder to accidentally leak private capability into runnable client code.
No. Embedding extends public surfaces but should preserve the same runtime and policy constraints as first-party playback.
Strong boundaries make openness safer. When constraints are clear, more creators can share runnable work without hidden risk assumptions.