This project is under active development. Only the latest main branch and the latest tagged release are supported.
If you believe you found a security vulnerability:
- Do not open a public issue.
- Send details privately to the maintainer:
- GitHub: open a private security advisory (preferred)
- Or DM on X: @AIOnlyDeveloper
Please include:
- a clear description of the issue and impact
- reproduction steps (minimal)
- affected version / commit SHA
- OS + environment details (Windows / WSL / Linux)
This orchestrator is intentionally powerful (it controls local terminals and can execute actions).
Safe-by-default assumptions:
- The server binds to loopback by default (
127.0.0.1). - If you enable LAN binding, you must use
AUTH_TOKEN(or you are effectively granting network users control).
If you deploy this tool in a shared environment, treat it like local admin tooling:
- restrict network exposure
- run on trusted machines only
- keep
AUTH_TOKENenabled for any non-loopback binding
Before publishing a release branch publicly:
npm run audit:public-releasenpm run audit:public-release:history
These checks verify tracked-artifact hygiene, docs path hygiene, bind-host/auth defaults, and history secret scanning.