VomeSync Security Audit

Generated: 2026-01-25

Scope: This audit covers the VomeSync webserver API, website UI, Redis storage, media ingestion pipeline, Home Assistant integration, and CI test coverage in this repository. It does not replace external penetration testing or infrastructure audits.

Contents


Summary

VomeSync’s security posture centres on strong authentication paths, server-side permission checks, and minimising exposure of sensitive keys. Bearer keys are never stored in plaintext in Redis, logs are redacted, and access-key toggles are constrained by server-side permissions.

System overview

Threat model

Unauthorised toggle or privilege escalation
Bearer key leakage (logs, Redis, URLs)
SSRF or malicious image payloads
Abuse or brute-force traffic
Reverse proxy misconfiguration

Security controls

Authentication and authorisation
Key handling and log redaction
Media ingestion and hosting
Abuse controls
Transport and deployment

Security tests

Webserver unit/integration tests
Website UI regression tests
Home Assistant integration tests
End-to-end coverage

Operational guidance

Pre-beta essentials

Residual risks

Key compromise
Dependency and environment risks
Public listings

Recommendations

Operational improvements