DevBridge provides direct terminal access to your system. It should NEVER be exposed directly to the public internet without proper security measures.
# Use Tailscale for secure remote access
curl -fsSL https://tailscale.com/install.sh | sh
tailscale up
# Access DevBridge only via Tailscale IP
# http://100.x.x.x:8000Use Authelia, Authentik, or similar authentication proxy in front of DevBridge.
# Only allow access from VPN or specific IPs
ufw allow from 100.0.0.0/8 to any port 8000 # Tailscale
ufw deny 8000Always use HTTPS in production with a reverse proxy like Nginx or Caddy.
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
If you discover a security vulnerability in DevBridge, please report it responsibly.
DO NOT open a public GitHub issue for security vulnerabilities.
Instead, please email: mateuszsury25@gmail.com
Subject: [SECURITY] Brief description of the vulnerability
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Suggested fix (if any)
- Your contact information for follow-up
| Stage | Timeline |
|---|---|
| Acknowledgment | Within 48 hours |
| Initial Assessment | Within 7 days |
| Fix Development | Depends on severity |
| Public Disclosure | After fix is released |
- We will acknowledge receipt of your report
- We will investigate and validate the vulnerability
- We will work on a fix
- We will release a security patch
- We will credit you in the release notes (unless you prefer anonymity)
| Level | Description | Response Time |
|---|---|---|
| Critical | Remote code execution, authentication bypass | 24-48 hours |
| High | Privilege escalation, data exposure | 3-5 days |
| Medium | Limited impact vulnerabilities | 1-2 weeks |
| Low | Minor issues, hardening suggestions | Next release |
- Change default credentials immediately after first run
- Use strong, unique passwords
- Consider enabling authentication even for local deployments
- Never expose DevBridge directly to the internet
- Use VPN (Tailscale, WireGuard) for remote access
- Use reverse proxy with SSL for HTTPS
- Implement IP whitelisting where possible
- Set reasonable idle timeouts for terminal sessions
- Limit maximum concurrent sessions
- Regularly review active sessions
- Keep DevBridge updated to the latest version
- Monitor release notes for security patches
- Subscribe to GitHub releases for notifications
DevBridge provides full terminal access with the permissions of the user running the server. This means:
- Commands run with server user's privileges
- File system access matches server user's permissions
- Network access from the server's perspective
- WebSocket connections maintain persistent terminal sessions
- Ensure WebSocket traffic is encrypted (WSS) in production
- Session data is stored in SQLite database
- Terminal scrollback is stored in memory and database
- Ensure proper file permissions on the data directory
For security concerns: mateuszsury25@gmail.com
For general questions: Open a GitHub issue