@cluesmith/codev 1.4.11 → 1.4.12

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@cluesmith/codev",
3
- "version": "1.4.11",
3
+ "version": "1.4.12",
4
4
  "description": "Codev CLI - AI-assisted software development framework",
5
5
  "type": "module",
6
6
  "bin": {
@@ -30,6 +30,7 @@ af start [options]
30
30
  - `-c, --cmd <command>` - Command to run in architect terminal
31
31
  - `-p, --port <port>` - Port for architect terminal
32
32
  - `--no-role` - Skip loading architect role prompt
33
+ - `--allow-insecure-remote` - Bind to 0.0.0.0 for remote access (see below)
33
34
 
34
35
  **Description:**
35
36
 
@@ -51,7 +52,59 @@ af start -p 4300
51
52
 
52
53
  # Start with specific command
53
54
  af start -c "claude --model opus"
55
+
56
+ # Start with remote access enabled
57
+ af start --allow-insecure-remote
58
+ ```
59
+
60
+ #### Remote Access
61
+
62
+ By default, Agent Farm binds to `localhost` (127.0.0.1), making it accessible only from the local machine. To access the dashboard from another device (e.g., a tablet, phone, or another computer on your network):
63
+
64
+ ```bash
65
+ af start --allow-insecure-remote
66
+ ```
67
+
68
+ This binds the server to `0.0.0.0`, making it accessible from any network interface.
69
+
70
+ **Finding your machine's IP:**
71
+ ```bash
72
+ # macOS
73
+ ipconfig getifaddr en0 # WiFi
74
+ ipconfig getifaddr en1 # Ethernet
75
+
76
+ # Linux
77
+ hostname -I | awk '{print $1}'
78
+ ```
79
+
80
+ **Accessing remotely:**
54
81
  ```
82
+ http://<your-ip>:4200
83
+ ```
84
+
85
+ **⚠️ Security Warning:**
86
+
87
+ The `--allow-insecure-remote` flag provides **no authentication**. Anyone on your network can:
88
+ - View and interact with all terminals
89
+ - Execute commands as your user
90
+ - Access and modify your code
91
+
92
+ **Only use this on trusted networks** (home WiFi, isolated development networks). Never use on:
93
+ - Public WiFi (coffee shops, airports)
94
+ - Shared office networks without VPN
95
+ - Any network with untrusted users
96
+
97
+ **For secure remote access**, consider:
98
+ 1. **SSH tunneling** (recommended):
99
+ ```bash
100
+ # On remote machine, tunnel to your dev machine
101
+ ssh -L 4200:localhost:4200 user@your-dev-machine
102
+ # Then open http://localhost:4200 on the remote machine
103
+ ```
104
+
105
+ 2. **VPN** - Access your home/office network securely
106
+
107
+ 3. **Tailscale/ZeroTier** - Mesh VPN for secure device-to-device connections
55
108
 
56
109
  ---
57
110