Authentication & Security
Overview
VibeTunnel supports multiple authentication modes:- None (localhost only)
- Password (simple shared secret)
- Token (JWT-based)
- External (Tailscale, ngrok)
Configuration
Security Settings
Setting | Default | Options |
---|---|---|
Authentication | None | None, Password, Token |
Network | Localhost | Localhost, LAN, Public |
Password | - | User-defined |
Token Expiry | 24h | 1h-7d |
Enable Authentication
Password Authentication
Server Configuration
Client Login
Token Authentication
JWT Structure
Token Generation
Token Validation
Network Security
Localhost Only (Default)
LAN Access
HTTPS/WSS
External Access
Tailscale Integration
ngrok Tunnel
Session Security
Isolation
Each session runs in a separate process with user permissions:Resource Limits
Security Headers
Audit Logging
Best Practices
- Always use authentication for non-localhost access
- Rotate tokens regularly
- Use HTTPS/WSS in production
- Limit session lifetime to prevent resource exhaustion
- Monitor audit logs for suspicious activity
- Keep dependencies updated for security patches
Threat Model
Threat | Mitigation |
---|---|
Unauthorized access | Password/token auth |
Session hijacking | JWT expiry, HTTPS |
Resource exhaustion | Rate limiting, quotas |
Code injection | Input sanitization |
Network sniffing | TLS encryption |
Compliance
Data Protection
- No persistent storage of terminal content
- Sessions cleared on exit
- Optional recording with user consent
Access Control
- Authentication required for remote access
- Session isolation per user
- No privilege escalation