If you discover a security vulnerability, please report it responsibly:
- Do NOT open a public issue
- Email security@ghostinthedroid.com or open a private security advisory on GitHub
- Include a description of the vulnerability and steps to reproduce
We will acknowledge receipt within 48 hours and provide a timeline for a fix.
This project controls Android devices via ADB and runs subprocesses. Key security considerations:
- No authentication on the API by default — the server binds to
0.0.0.0:5055. Do not expose to the public internet without adding auth. - ADB access grants full device control. Only connect trusted devices.
- Subprocess execution — the scheduler and bot system launch Python scripts. Config is stored in the database, not user-supplied at runtime.
- API keys are loaded from
.envand never logged or returned in API responses.
- Run behind a reverse proxy (nginx/caddy) with authentication if exposing to a network
- Use
.envfor all secrets — never commit credentials - Keep ADB debugging disabled on devices when not in use