

- Fixed credential-exfiltration risk in /api/proxy/image: Previously the endpoint could:
- accept arbitrary auth_id
- load stored API keys
- forward them to attacker-controlled URLs
- Enforced outbound host allowlist globally Previously:
- allowlist existed
- but outgoingFetch() didn’t enforce it
- plugins/engines could bypass it
- Fixed extension store path traversal Previously a malicious store manifest could:
- inject … paths
- escape install directories
- reference arbitrary files
- Hardened proxy IP trust Previously:
- rate limiting trusted any X-Forwarded-For header
- clients could spoof their IP
- Fixed inconsistent settings authentication Previously:
- settings UI stored an auth token
- but the settings modal didn’t send it when saving
- Implemented Improved proxy deployment support
- Added proxy-aware behavior:
- DEGOOG_PUBLIC_BASE_URL for canonical URLs
- secure cookie handling when X-Forwarded-Proto=https
Additional Improvements:
- suggestion fetching hardened
- DuckDuckGo suggestion parsing fixed
- unified outbound request handling
- install state guard properly cleaned up
Made some other changes for my specific deployment. Very happy with your work so far. Thanks so much




Really excited about the 2 projects that popped up. Claw Code is porting from Python to Rust which will be interesting. And OpenClaude will use an existing codex login to operate on Gpt5.4 which I’m looking forward to playing with during the long weekend.
Using codex on Gpt5.4 with x-high reasoning got me similar results to ClaudeCode on Opus. So I’ll be interested to see the results