Skip to content

Security: roastcodes/ttdash

Security

SECURITY.md

Security Policy

Supported Versions

Security fixes are applied to the latest release on main.

If you are reporting a vulnerability, please reproduce it against the current release or current main before reporting when possible.

Reporting a Vulnerability

Please use GitHub private vulnerability reporting if it is enabled for the public repository.

If private reporting is not available:

  • do not open a public issue with exploit details
  • open a minimal issue requesting a private contact path, or contact the maintainer through GitHub first

Please include:

  • a clear description of the issue
  • affected versions or commit range if known
  • reproduction steps or proof of concept
  • impact assessment
  • any suggested mitigation if you already have one

Response Expectations

This project is maintained on a best-effort basis by a single maintainer. Reports will be reviewed as quickly as practical, but no fixed response SLA is promised.

Deployment Notes

TTDash is intended to run as a local-first app on loopback by default. Binding it to a non-loopback host exposes local API routes for uploads, imports, resets, and report generation to your network.

Non-loopback binding therefore requires an explicit opt-in and a remote token with at least 24 characters. Only use remote token access over a trusted LAN, VPN, or SSH tunnel; for any public hostname, put TTDash behind an HTTPS reverse proxy with valid TLS termination before sending the bearer token.

TTDASH_ALLOW_REMOTE=1 TTDASH_REMOTE_TOKEN=<long-random-token> HOST=0.0.0.0 ttdash
curl -H "Authorization: Bearer $TTDASH_REMOTE_TOKEN" http://127.0.0.1:3000/api/usage

When calling the server from another device, replace 127.0.0.1 with the server's LAN, VPN, or SSH-tunneled host. For public hostnames, call an HTTPS reverse proxy URL instead; do not send the bearer token over public HTTP.

Remote API requests can authenticate with Authorization: Bearer $TTDASH_REMOTE_TOKEN or the equivalent X-TTDash-Remote-Token header. Keep the token secret.

There aren't any published security advisories