@cluesmith/codev 1.4.11 → 1.4.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json
CHANGED
|
@@ -30,6 +30,7 @@ af start [options]
|
|
|
30
30
|
- `-c, --cmd <command>` - Command to run in architect terminal
|
|
31
31
|
- `-p, --port <port>` - Port for architect terminal
|
|
32
32
|
- `--no-role` - Skip loading architect role prompt
|
|
33
|
+
- `--allow-insecure-remote` - Bind to 0.0.0.0 for remote access (see below)
|
|
33
34
|
|
|
34
35
|
**Description:**
|
|
35
36
|
|
|
@@ -51,7 +52,59 @@ af start -p 4300
|
|
|
51
52
|
|
|
52
53
|
# Start with specific command
|
|
53
54
|
af start -c "claude --model opus"
|
|
55
|
+
|
|
56
|
+
# Start with remote access enabled
|
|
57
|
+
af start --allow-insecure-remote
|
|
58
|
+
```
|
|
59
|
+
|
|
60
|
+
#### Remote Access
|
|
61
|
+
|
|
62
|
+
By default, Agent Farm binds to `localhost` (127.0.0.1), making it accessible only from the local machine. To access the dashboard from another device (e.g., a tablet, phone, or another computer on your network):
|
|
63
|
+
|
|
64
|
+
```bash
|
|
65
|
+
af start --allow-insecure-remote
|
|
66
|
+
```
|
|
67
|
+
|
|
68
|
+
This binds the server to `0.0.0.0`, making it accessible from any network interface.
|
|
69
|
+
|
|
70
|
+
**Finding your machine's IP:**
|
|
71
|
+
```bash
|
|
72
|
+
# macOS
|
|
73
|
+
ipconfig getifaddr en0 # WiFi
|
|
74
|
+
ipconfig getifaddr en1 # Ethernet
|
|
75
|
+
|
|
76
|
+
# Linux
|
|
77
|
+
hostname -I | awk '{print $1}'
|
|
78
|
+
```
|
|
79
|
+
|
|
80
|
+
**Accessing remotely:**
|
|
54
81
|
```
|
|
82
|
+
http://<your-ip>:4200
|
|
83
|
+
```
|
|
84
|
+
|
|
85
|
+
**⚠️ Security Warning:**
|
|
86
|
+
|
|
87
|
+
The `--allow-insecure-remote` flag provides **no authentication**. Anyone on your network can:
|
|
88
|
+
- View and interact with all terminals
|
|
89
|
+
- Execute commands as your user
|
|
90
|
+
- Access and modify your code
|
|
91
|
+
|
|
92
|
+
**Only use this on trusted networks** (home WiFi, isolated development networks). Never use on:
|
|
93
|
+
- Public WiFi (coffee shops, airports)
|
|
94
|
+
- Shared office networks without VPN
|
|
95
|
+
- Any network with untrusted users
|
|
96
|
+
|
|
97
|
+
**For secure remote access**, consider:
|
|
98
|
+
1. **SSH tunneling** (recommended):
|
|
99
|
+
```bash
|
|
100
|
+
# On remote machine, tunnel to your dev machine
|
|
101
|
+
ssh -L 4200:localhost:4200 user@your-dev-machine
|
|
102
|
+
# Then open http://localhost:4200 on the remote machine
|
|
103
|
+
```
|
|
104
|
+
|
|
105
|
+
2. **VPN** - Access your home/office network securely
|
|
106
|
+
|
|
107
|
+
3. **Tailscale/ZeroTier** - Mesh VPN for secure device-to-device connections
|
|
55
108
|
|
|
56
109
|
---
|
|
57
110
|
|