homeMaker is designed for self-hosted deployment behind Tailscale. It is NOT intended for public internet exposure. If you expose it publicly, you accept all associated risks.
If you discover a security vulnerability:
- DO NOT open a public GitHub issue
- Open a private security advisory on the GitHub repository
- Or email: security@protolabs.studio
- Description of the vulnerability
- Steps to reproduce
- Impact assessment
- Suggested fix (optional)
- Secrets vault uses AES-256-GCM encryption at rest
- Master key stored in
HOMEMAKER_VAULT_KEYenvironment variable (never in code or config files) - Decrypted values are never logged
- Designed for Tailscale-only access (no public internet)
- API key authentication on all server endpoints
- Rate limiting on sensitive endpoints (vault reads, sensor reports)
- All data stored locally in SQLite (no cloud sync)
- Sensitive data encrypted before write
- No telemetry or external data transmission
- Keep Node.js and dependencies up to date
- Use a strong, randomly generated
HOMEMAKER_VAULT_KEY(openssl rand -hex 32) - Use a strong
AUTOMAKER_API_KEYfor server authentication - Restrict Tailscale ACLs to trusted household devices
- Review AI agent output before acting on recommendations