Warn users about secret uniqueness and update README #39
Labels
No labels
prio_critical
prio_low
type_bug
type_contact
type_issue
type_lead
type_question
type_story
type_task
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
lhumina_code/hero_compute#39
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
The current secret model uses the secret as both identity and access control. Two users who set the same secret can see and manage each other's VMs.
This is by design for simplicity but must be clearly communicated to users.
UI changes:
Generate the default action
"⚠ This secret is too simple. Anyone who guesses it can access your VMs. Use
Generate for a secure secret."
"Your secret is your identity on this node.
It is used to access and manage your VMs.
Anyone with the same secret can see your VMs
— treat it like a private key, not a password
word. Always use the Generate button."
README update:
Add a Security section explaining:
Gap: No cross-explorer identity — secrets are local to each dashboard
Currently the secret is stored in the browser's localStorage and scoped to each dashboard independently. This breaks in a multi-node, multi-explorer setup:
test, deploys VM-1 and VM-2test2, deploys VM-3 and VM-4The secret was designed as a capability token, but in a fleet of explorers it becomes an identity fragmentation problem.
Proposed solution: A central identity layer sitting above all explorers. The user registers once and gets a single secret or token that works across all explorers. This could be:
The explorer already acts as the aggregation layer for nodes. Making it the identity boundary as well (Option D) would require the least new infrastructure — users register with one explorer and that explorer proxies access to all nodes using a unified identity.
This needs an architectural decision before implementation.