Skip to content

Shell/exec feature broken by default proxy security (EXEC=0 in compose) #9

@cat-hoang

Description

@cat-hoang

Problem
The provided docker-compose.yml uses the Docker Socket Proxy with EXEC: 0, which blocks all exec-related Docker API calls. The Shell/Terminal feature (backend /exec WS endpoint, frontend terminal UI) cannot work in this security mode.

Impact

  • Out of the box, Shell/Terminal is broken in compose usage.
  • Users may be confused why the UI feature exists if it is always disabled by default.

Recommendation

  • Make Shell feature an opt-in feature flag (ENABLE_SHELL).
  • If disabled, hide Shell UI/buttons and disable related endpoints.
  • If enabled, clearly document the security model and required proxy settings (EXEC=1 needed).
  • Consider requiring authentication when enabling Shell on LAN/WAN.

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions