# Security PinchTab is designed to be usable by default on a local machine without exposing high-risk browser control features unless you explicitly turn them on. The default security posture is: - `server.bind = 127.0.0.1` - `server.token` is generated during default setup and should remain set - `security.allowEvaluate = false` - `security.allowMacro = false` - `security.allowScreencast = false` - `security.allowDownload = false` - `security.allowUpload = false` - `security.attach.enabled = false` - `security.attach.allowHosts = ["127.0.0.1", "localhost", "::1"]` - `security.attach.allowSchemes = ["ws", "wss"]` - `security.idpi.enabled = true` - `security.idpi.allowedDomains = ["127.0.0.1", "localhost", "::1"]` - `security.idpi.strictMode = true` - `security.idpi.scanContent = true` - `security.idpi.wrapContent = true` Use `pinchtab security` to review the current posture and restore the recommended defaults. ## Security Philosophy PinchTab follows a few simple rules: - default to local-only access - default dangerous capabilities to off - separate transport access from feature exposure - fail closed when content or domain trust cannot be established This means there are two independent questions: 1. who can reach the server 2. what the server is allowed to do once reached Both matter. Binding to loopback reduces who can reach the API. Tokens reduce who can use it successfully. Sensitive endpoint gates reduce what a successful caller can do. IDPI reduces which websites and extracted content are trusted enough to pass deeper into an agent workflow. ## API Token `server.token` is the bearer token expected by the server. When it is set, requests must send: ```http Authorization: Bearer ``` Why this matters: - without a token, any process that can reach the server can call the API - on `127.0.0.1`, that still includes local scripts, browser pages, other users on the same machine, and malware - on `0.0.0.0` or a LAN bind, a missing token is a much bigger risk Recommended practice: - keep `server.bind` on `127.0.0.1` - set a strong random `server.token` - only widen the bind when remote access is intentional `pinchtab config init` generates and stores a token as part of the default setup: ```bash pinchtab config init ``` You can also generate one from the dashboard Settings page or let `pinchtab security` restore create one if `server.token` is empty. If you are calling the API manually: ```bash curl -H "Authorization: Bearer " http://127.0.0.1:9867/health ``` CLI commands use the configured local server settings by default, and `PINCHTAB_TOKEN` can override the token for a single shell session. ## Sensitive Endpoints Some endpoint families expose much more power than normal navigation and inspection. PinchTab keeps them disabled by default: - `security.allowEvaluate` - `security.allowMacro` - `security.allowScreencast` - `security.allowDownload` - `security.allowUpload` Why they are considered dangerous: - `evaluate` can execute JavaScript in page context - `macro` can trigger higher-level automation flows - `screencast` can stream live page contents - `download` can fetch and persist remote content - `upload` can push local files into browser flows These are not the same as authentication. - auth decides who may call the API - sensitive endpoint gates decide which high-risk capabilities exist at all For example, a token-protected server with `security.allowEvaluate = true` is still intentionally exposing JavaScript execution to any caller that has the token. When disabled, these routes are locked and return a `403` explaining that the endpoint family is disabled in config. ## Attach Policy Attach is an advanced feature for registering an externally managed Chrome instance through a CDP URL. It is disabled by default: ```json { "security": { "attach": { "enabled": false, "allowHosts": ["127.0.0.1", "localhost", "::1"], "allowSchemes": ["ws", "wss"] } } } ``` If you enable attach: - keep `allowHosts` narrowly scoped - prefer local-only hosts unless external Chrome targets or remote bridges are intentional - only attach to browsers and CDP endpoints you trust If you use `POST /instances/attach-bridge`, `security.attach.allowSchemes` must also include `http` or `https`. ## IDPI IDPI stands for Indirect Prompt Injection defense. It exists to reduce the chance that untrusted website content influences downstream agents through hidden instructions, poisoned text, or unsafe navigation. PinchTab's IDPI layer currently does four things: - restricts navigation to an allowlist of approved domains - blocks or warns when a URL cannot be matched against that allowlist - scans extracted content for suspicious prompt-injection patterns - wraps text output so downstream systems can treat it as untrusted content The default local-only IDPI config is: ```json { "security": { "idpi": { "enabled": true, "allowedDomains": ["127.0.0.1", "localhost", "::1"], "strictMode": true, "scanContent": true, "wrapContent": true, "customPatterns": [] } } } ``` Important notes: - if `allowedDomains` is empty, the main domain restriction is not doing useful work - if `allowedDomains` contains `"*"`, the whitelist effectively allows everything - `strictMode = true` blocks disallowed domains and suspicious content - `strictMode = false` allows the request but emits warnings instead - `scanContent` protects `/text` and `/snapshot` style extraction paths - `wrapContent` adds explicit untrusted-content framing for downstream consumers Supported domain patterns are: - exact host: `example.com` - subdomain wildcard: `*.example.com` - full wildcard: `*` `*` is convenient, but it defeats the main allowlist defense and should be avoided unless you are deliberately disabling domain restriction. ## Recommended Config For a secure local setup: ```json { "server": { "bind": "127.0.0.1", "token": "replace-with-a-generated-token" }, "security": { "allowEvaluate": false, "allowMacro": false, "allowScreencast": false, "allowDownload": false, "allowUpload": false, "attach": { "enabled": false, "allowHosts": ["127.0.0.1", "localhost", "::1"], "allowSchemes": ["ws", "wss"] }, "idpi": { "enabled": true, "allowedDomains": ["127.0.0.1", "localhost", "::1"], "strictMode": true, "scanContent": true, "wrapContent": true, "customPatterns": [] } } } ``` If you intentionally expose PinchTab beyond localhost, treat the token as mandatory and keep the sensitive endpoint families disabled unless you have a specific reason to enable them.