Conversation
…el to comply with react hook rules
|
I don't understand the need to add the Trivvy security action, especially since its a very unknown security workflow that I dont trust. Dependabot is already in use, as you im sure have seen, as you added the action. Also, why did you change the pr check action to use ubuntu-latest instead of the blacksmith runner? As far as I'm concerned, this can be closed as it being unneccessairy. |
|
Given that the project doesn't use any kind of security checks I wanted to contribute and make this more transparent. The dependencies in the codebase had multiple vulnerabilities which Trivy can help make visible and I have used this feedback to update the affected dependencies.
|
|
What do you mean this project does not use any security checks? https://github.com/Termix-SSH/Termix/blob/main/.github/dependabot.yml
As I mentioned before, Dependabot is in use and is by far the more popular and well-trusted source. |
|
Sorry, then I might have overlooked that. It might be good to have a second opinion though, as I'm not sure which databases Dependabot uses to claim vulnerabilities. Anyway, if you don't want to merge the sec-check, at least take a look at the pr-check fix. |
|
The changes to the PR linter look good to me. it may be best if the linter stays on node 20 since that's what the rest of Termix is compiled to, but it does not really matter. If you update or re-submit this PR without the security linter added, I will merge it. |
|
If you're ready to accept this branch merge, I can audit and clean it up once. Let me know anytime if you need it. @LukeGus |
Hi @LukeGus, @muchasxmaracas, I'm a homelab user who recently deployed Termix in a test environment to evaluate it as an SSH management platform. I came across this PR and the discussion here, and I wanted to share my perspective as someone in the target audience for this project. First — Termix is an impressive project with a lot of potential, and I appreciate the work that's gone into it. However, after reviewing this PR conversation alongside the two published security advisories (CVE-2025-59951 and the stored XSS/LFI), I've decided to uninstall Termix from my environment. My concern isn't with any single issue — it's with the overall approach to security contributions. A few observations:
For a tool that stores SSH credentials and provides terminal access to infrastructure, defence in depth isn't optional — it's expected. I'd respectfully recommend:
I hope this feedback is useful. I'd genuinely like to see Termix succeed — it fills a real gap in the self-hosted space. But I can't deploy a credentials management tool where security contributions are treated as unnecessary. Thanks for your time. |
|
I think @jnctech is right as it benefit in long term as it grows trust and community adoption. |
|
@jnctech Thank you for your perspective and verbalizing what I couldn't. I have only installed Termix locally but I could already tell that's it's a really cool project and I want it to succeed as well, hence my PR. Given my years of professional experience in the DevOps area, creating opinionated CI/CD templates and more for hundreds of engineers in my company which relies on security checks due to regulations I felt like this project could benefit a lot from my contributions. I don't have much experience contributing to open-source projects but after receiving such an adversarial reaction to a well-meant contribution, my desire to contribute more has honestly vanished. If you or anybody else has recommendations to other projects which appreciate security and CI/CD PRs, I'll gladly look into it. |

Overview
[ ✅ ] Added:
Trivy dependency vulnerability scan ->
.github/workflows/sec-check.yml[ ✅] Updated:
eslint.config.jsto align local linting with linting in CI jobUpdated all npm dependencies and pinned two transient dependencies with HIGH + MEDIUM vulnerabilities
[ ✅] Fixed:
PR Check job
Changes Made
Related Issues
Screenshots / Demos
Checklist