docs/Docs_To_Review/DESKTOP_CONFIGURATION.md
World Monitor desktop now uses a runtime configuration schema with per-feature toggles and secret-backed credentials.
The desktop vault schema supports the following 17 keys used by services and relays:
GROQ_API_KEYOPENROUTER_API_KEYFRED_API_KEYEIA_API_KEYFINNHUB_API_KEYCLOUDFLARE_API_TOKENACLED_ACCESS_TOKENURLHAUS_AUTH_KEYOTX_API_KEYABUSEIPDB_API_KEYNASA_FIRMS_API_KEYWINGBITS_API_KEYVITE_OPENSKY_RELAY_URLOPENSKY_CLIENT_IDOPENSKY_CLIENT_SECRETAISSTREAM_API_KEYVITE_WS_RELAY_URLEach feature includes:
id: stable feature identifier.requiredSecrets: list of keys that must be present and valid.enabled: user-toggle state from runtime settings panel.available: computed (enabled && requiredSecrets valid).fallback: user-facing degraded behavior description.Desktop builds persist secrets in OS credential storage through Tauri command bindings backed by Rust keyring entries (world-monitor service namespace).
Secrets are not stored in plaintext files by the frontend.
If required secrets are missing/disabled: