@lamalibre/portlama-agent 1.0.0 → 1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE.md +17 -0
- package/README.md +15 -0
- package/package.json +1 -1
package/LICENSE.md
CHANGED
|
@@ -98,3 +98,20 @@ The **licensor** is the individual or entity offering these terms, and the **sof
|
|
|
98
98
|
**Your licenses** are all the licenses granted to you for the software under these terms.
|
|
99
99
|
|
|
100
100
|
**Use** means anything you do with the software requiring one of your licenses.
|
|
101
|
+
|
|
102
|
+
---
|
|
103
|
+
|
|
104
|
+
## Disclaimer
|
|
105
|
+
|
|
106
|
+
This software is provided "as is", without warranty of any kind, express or implied. The authors and contributors accept no liability for any damages, data loss, security incidents, or legal consequences arising from the use of this software.
|
|
107
|
+
|
|
108
|
+
Portlama is designed for self-hosted use cases — personal projects, development environments, demos, and internal tools. It is not a substitute for production infrastructure. Production workloads require dedicated hosting, load balancing, redundancy, monitoring, and operational expertise that are beyond the scope of this project.
|
|
109
|
+
|
|
110
|
+
**You are solely responsible for what you expose through Portlama.** By tunneling an application to the public internet, you grant anyone with access the ability to interact with that application as if they were on your local network. This carries inherent risks:
|
|
111
|
+
|
|
112
|
+
- **Arbitrary code execution:** If the tunneled application contains vulnerabilities or backdoors, remote attackers may exploit them to execute code on your machine, access your file system, or compromise your operating system.
|
|
113
|
+
- **Data exposure:** Misconfigured or insecure applications may leak sensitive data, credentials, or private files to the internet.
|
|
114
|
+
- **Lateral movement:** A compromised tunneled application may be used as an entry point to attack other devices and services on your local network.
|
|
115
|
+
- **Resource abuse:** Publicly accessible applications may be used for cryptocurrency mining, spam relaying, botnet hosting, or other abuse that could result in legal action against you.
|
|
116
|
+
|
|
117
|
+
Portlama provides authentication and access control mechanisms, but no security measure is absolute. It is your responsibility to understand the software you expose, keep it updated, and assess the risks of making it publicly accessible. The authors of Portlama bear no responsibility for the consequences of tunneling untrusted, vulnerable, or malicious software.
|
package/README.md
CHANGED
|
@@ -46,6 +46,21 @@ or network changes.
|
|
|
46
46
|
See the main repository for architecture, tunnel configuration, and the full
|
|
47
47
|
development plan: <https://github.com/lamalibre/portlama>
|
|
48
48
|
|
|
49
|
+
## Disclaimer
|
|
50
|
+
|
|
51
|
+
This software is provided "as is", without warranty of any kind, express or implied. The authors and contributors accept no liability for any damages, data loss, security incidents, or legal consequences arising from the use of this software.
|
|
52
|
+
|
|
53
|
+
Portlama is designed for self-hosted use cases — personal projects, development environments, demos, and internal tools. It is not a substitute for production infrastructure. Production workloads require dedicated hosting, load balancing, redundancy, monitoring, and operational expertise that are beyond the scope of this project.
|
|
54
|
+
|
|
55
|
+
**You are solely responsible for what you expose through Portlama.** By tunneling an application to the public internet, you grant anyone with access the ability to interact with that application as if they were on your local network. This carries inherent risks:
|
|
56
|
+
|
|
57
|
+
- **Arbitrary code execution:** If the tunneled application contains vulnerabilities or backdoors, remote attackers may exploit them to execute code on your machine, access your file system, or compromise your operating system.
|
|
58
|
+
- **Data exposure:** Misconfigured or insecure applications may leak sensitive data, credentials, or private files to the internet.
|
|
59
|
+
- **Lateral movement:** A compromised tunneled application may be used as an entry point to attack other devices and services on your local network.
|
|
60
|
+
- **Resource abuse:** Publicly accessible applications may be used for cryptocurrency mining, spam relaying, botnet hosting, or other abuse that could result in legal action against you.
|
|
61
|
+
|
|
62
|
+
Portlama provides authentication and access control mechanisms, but no security measure is absolute. It is your responsibility to understand the software you expose, keep it updated, and assess the risks of making it publicly accessible. The authors of Portlama bear no responsibility for the consequences of tunneling untrusted, vulnerable, or malicious software.
|
|
63
|
+
|
|
49
64
|
## License
|
|
50
65
|
|
|
51
66
|
[Polyform Noncommercial 1.0.0](./LICENSE.md) — see [LICENSE.md](./LICENSE.md) for details.
|
package/package.json
CHANGED