This project generates infrastructure code that will manage servers, credentials, and deployments. Security matters.
- Vulnerabilities in generated Terraform/scripts that could expose credentials
- Flaws that could allow unauthorized access to deployed infrastructure
- Issues where secrets might be committed to git
- Bugs in the runner that could execute unintended commands
- SOPS/age encryption weaknesses in generated bundles
- Bugs in detection logic (those are regular bugs)
- Missing features
- Documentation errors
- Hetzner Cloud vulnerabilities (report those to Hetzner)
Do not open a public issue for security vulnerabilities.
Instead, email the maintainer directly or use GitHub's private vulnerability reporting feature if available.
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if you have one)
You should receive a response within 48 hours. If the vulnerability is confirmed, we will:
- Work on a fix
- Credit you in the release notes (unless you prefer anonymity)
- Release a patched version
When using this tool, remember:
- Review generated code — Don't blindly deploy AI-generated infrastructure
- Protect your secrets — Use GitHub Secrets, not committed files
- Limit SSH access — Configure allowed CIDRs in the generated Terraform
- Rotate credentials — Especially Hetzner API tokens and database passwords
- Check audit logs — Review
runs/directory for what was generated
Only the latest version on main receives security updates. There are no LTS versions.