Skip to content

Security

Wakeplane currently has no authentication or RBAC.

Any process that can reach the HTTP port can read schedules, list runs, create schedules, trigger runs, delete schedules, and access run receipts.

Do not expose Wakeplane directly to the public internet or to untrusted networks.

Acceptable deployment patterns right now:

  • Loopback only
  • Trusted subnet
  • VPN or overlay network
  • Reverse-proxied private network

Not acceptable:

  • Binding to 0.0.0.0 and exposing the port publicly
  • Deploying without a network boundary and assuming internal access is enough

Wakeplane is intended for:

  • embedded or internal operator-controlled systems
  • private control planes
  • trusted environments where network access is already constrained

It does not provide:

  • Authentication
  • Authorization or RBAC
  • Audit logging at the API layer
  • Native TLS
  • Multi-tenancy

See SECURITY.md in the repo root for reporting guidance.