| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability, please report it responsibly:
- Do NOT open a public issue for security vulnerabilities
- Email the maintainer directly or use GitHub's private vulnerability reporting
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
tailscale-proxy is designed with security in mind:
- Tailnet-only binding: By default, 9proxy is bound to your Tailscale IP only, preventing exposure to the public internet
- No credentials stored: The tool never stores your 9proxy login credentials
- Strict mode: Optional killswitch blocks all non-proxied traffic
- Use tailnet-only mode: Keep the proxy bound to your Tailscale IP
- Enable strict mode for sensitive use cases (blocks leaks if proxy goes offline)
- Use allowlist to restrict which tailnet devices can use the proxy
- Keep dependencies updated: Regularly update Tailscale, 9proxy, and redsocks
- Root access: Some operations require
sudofor iptables and systemd - Systemd services: Services are created in
/etc/systemd/system/ - Network rules: iptables rules are modified for transparent proxying
We appreciate responsible disclosure and will:
- Acknowledge receipt within 48 hours
- Provide an estimated timeline for a fix
- Credit reporters in release notes (unless anonymity is requested)