Authentication & Session Management

Browser-Based Login Flow

  • No password entry in terminal - CLI uses browser-based OAuth flow
  • 10-minute timeout for login completion
  • Secure token exchange via local callback server
  • Tokens stored locally in CLI config file
  • Automatic token refresh using refresh tokens

Session Security

Token refresh happens automatically on each CLI command to maintain secure sessions.

Data Protection

Encryption in Transit

  • HTTPS enforcement - All tunnel URLs use HTTPS
  • Database connections use TLS encryption
  • API endpoints require HTTPS in production

Password Storage

  • Secure authentication handles password hashing and storage
  • No plaintext passwords stored in application
  • Password policies enforced by authentication configuration

Sensitive Data Handling

  • API tokens stored encrypted in database
  • Integration tokens encrypted before storage
  • Share passwords stored as secure hashes
  • No secrets in client-side code

Access Control

Workspace-Level Security

  • Role-based access control (RBAC) for workspace operations
  • Admin-only actions for billing and integrations
  • Member invitations require admin approval
  • Audit logging for admin actions

Tunnel-Level Security

  • Share modes control who can view tunnels
  • Password protection option for sensitive tunnels
  • Guest comment controls can be disabled
  • Member-specific permissions for tunnel access

API Security

Every API endpoint validates workspace membership before allowing access. Unauthorized requests are rejected with appropriate error responses.

Input Validation & Sanitization

Email Validation

Standardized email validation is used across the application to ensure proper email format.

Comment Content Validation

  • Content length limits: 1-5,000 characters
  • XSS prevention: Content sanitized before storage
  • HTML escaping: Automatic in comment rendering

File Upload Security

  • Type validation for avatar uploads
  • Size limits enforced
  • Malicious file detection

Rate Limiting & Abuse Prevention

API Rate Limiting

  • Request throttling on sensitive endpoints
  • Brute force protection on auth attempts
  • Tunnel creation limits based on subscription tier

Tunnel Security

  • Provider timeouts for connection management
  • Connection monitoring via heartbeat system
  • Automatic cleanup of abandoned tunnels

Compliance & Privacy

Data Retention

  • Configurable retention policies for comments
  • Account deletion removes all user data
  • Workspace deletion is permanent and comprehensive

Privacy Controls

  • Guest comments optional per tunnel
  • Share modes for access control
  • Data export capabilities for user data portability

Security Monitoring & Logging

Automated Monitoring

  • Failed login attempts tracked and rate-limited
  • Tunnel heartbeat failures trigger status updates
  • API abuse patterns detected and blocked
  • Unusual access patterns flagged for review

Audit Logging

  • Admin actions logged with user and timestamp
  • Tunnel creation/deletion recorded
  • Billing changes tracked with full history
  • Integration connections logged with metadata

Incident Response

  • Immediate account suspension for security violations
  • Tunnel deactivation for abuse reports
  • Workspace lockdown for compromised accounts
  • Data preservation during security investigations

Compliance Considerations

Data Protection

  • GDPR compliance - Right to deletion and data export
  • Data minimization - Only collect necessary information
  • Purpose limitation - Use data only for stated purposes
  • Storage limitation - Retain data only as needed

Security Standards

  • Security controls and monitoring
  • Web application security best practices
  • Encryption standards - Industry-standard cryptographic practices
  • Access controls - Principle of least privilege enforcement

Security Best Practices for Users

For Workspace Admins

  • Regular membership audits - Review who has admin access
  • Strong passwords - Enforce good password policies
  • Integration monitoring - Review connected services regularly
  • Billing oversight - Monitor subscription status and invoices

For All Users

  • Secure tunnel sharing - Use appropriate share modes
  • Password protection - Enable for sensitive tunnels
  • Guest comment controls - Disable for private projects
  • Regular cleanup - Delete unused tunnels and comments

For CLI Users

  • Token security - Logout from shared machines
  • Provider updates - Keep tunnel providers updated
  • Local server security - Only tunnel development servers
  • Network awareness - Understand what's being exposed
Note: Security practices are continuously reviewed and updated based on emerging threats and compliance requirements.