A local-only admin bridge for secure LLM development workflows
DevProxy provides elevated system access through an API. USE AT YOUR OWN RISK.
This tool allows external programs (including AI assistants) to execute commands on your Windows system with elevated privileges. While security measures are in place, you should understand the risks:
- Elevated Privileges: Commands run with the same permissions as the DevProxy service
- Potential for Misuse: Even with whitelisting, PowerShell access can be dangerous
- Token Security: Anyone with the API token can execute commands
- AI Integration Risks: AI assistants may execute unintended commands
By using DevProxy, you acknowledge these risks and take full responsibility for any consequences.
DevProxy is a secure, local-only admin API for Windows development tasks. It runs as an elevated Windows service and exposes a localhost-only JSON API that allows trusted local agents (like Claude running in WSL) to execute safe build-related commands and file operations.
- 🔒 Secure by Design: Localhost-only binding (configurable port)
- 🛡️ Token Authentication: API token required for all requests
- ✅ Command Whitelisting: Only allows pre-approved development commands
- 📁 Path Restrictions: Operations limited to approved directories
- 🚫 System Protection: Blocks access to Windows system directories
- 📝 Comprehensive Logging: All requests logged with full details
- 🪟 Windows Service: Runs as an auto-start Windows service
- 🖥️ System Tray GUI: Admin panel for easy configuration
-
Build the executables:
scripts\build.bat
Or manually:
go build -o devproxy.exe cmd/devproxy/main.go go build -o devctl.exe cmd/devctl/main.go
-
Run interactively (for testing):
devproxy.exe
-
Install as Windows service (Run as Administrator):
scripts\service.bat install
When DevProxy runs for the first time, it generates a unique API token. This token is your only line of defense against unauthorized access.
- Run DevProxy interactively first:
devproxy.exe
- Copy the generated token from the console output
- Find the token in
config/config.json
under the"token"
field - NEVER commit this token to version control
- NEVER share this token publicly
If you're using DevProxy with an AI assistant (Claude, ChatGPT, etc.):
- Create a
CLAUDE.md
or similar file in your project - Add the token to this file for the AI to use
- IMPORTANT: Add this file to
.gitignore
- Consider the risks of giving an AI system access
Example CLAUDE.md format:
# DevProxy Access
**Token**: your-generated-token-here
Use this token with devctl.exe or API calls to execute Windows commands.
The default configuration includes PowerShell, which is powerful but dangerous. Review config/config.json
and remove any commands you don't need:
{
"allowed_commands": [
"go", "msbuild", "dotnet", "npm", "node", "python", "pip"
// Consider removing "powershell" if not needed
]
}
On first run, DevProxy creates a config/config.json
file with:
- Generated API token (save this securely!)
- Allowed commands list
- Allowed path patterns
- Log file location
- Port number (default: 2223)
Example configuration:
{
"api_token": "your-generated-token-here",
"allowed_commands": [
"go", "msbuild", "signtool", "powershell",
"dotnet", "gcc", "g++", "make", "cmake",
"npm", "node", "python", "pip"
],
"allowed_paths": [
"C:\\Dev",
"C:\\Users\\*\\Projects",
"C:\\Users\\*\\source\\repos"
],
"log_file": "logs\\log.txt",
"port": 2223
}
C:\Users\*\Projects
) may not work as expected. Use specific paths when possible.
Run devproxy-tray.exe
to access the admin panel where you can:
- Start/Stop/Restart the service
- Change the port number
- Manage allowed paths
- View and regenerate the API token
- Edit allowed commands
POST /run
Headers:
X-Admin-Token: your-api-token
Content-Type: application/json
Request body:
{
"command": "go",
"args": ["build", "-o", "out.exe"],
"cwd": "C:\\Dev\\MyApp"
}
Response:
{
"stdout": "...",
"stderr": "",
"exit_code": 0
}
- System directories (C:\Windows, C:\Program Files, etc.)
- Registry modifications
- Service management commands
- System shutdown/restart commands
- Path traversal attempts (..)
reg
,shutdown
,format
,schtasks
,sc
,net
,bcdedit
,diskpart
AI assistants running in WSL can use devctl.exe directly:
/mnt/c/path/to/devctl.exe -token YOUR_TOKEN -cwd C:\\Dev command args
- Audit Regularly: Review
logs/log.txt
frequently - Limit Scope: Only allow paths where AI should operate
- Remove Dangerous Commands: Consider removing PowerShell access
- Monitor Activity: Watch for unexpected command patterns
- Revoke Access: Regenerate token if you suspect misuse
# Install and start service
scripts\service.bat install
# Stop service
scripts\service.bat stop
# Start service
scripts\service.bat start
# Check service status
scripts\service.bat status
# Uninstall service
scripts\service.bat uninstall
Using curl:
curl -X POST http://127.0.0.1:2223/run \
-H "X-Admin-Token: your-token-here" \
-H "Content-Type: application/json" \
-d '{
"command": "go",
"args": ["version"],
"cwd": "C:\\Dev"
}'
All operations are logged to logs/log.txt
in JSON format, including:
- Timestamp
- Source IP
- Command and arguments
- Working directory
- Output (stdout/stderr)
- Exit code
- Status (completed/rejected)
- Rejection reason (if applicable)
Review logs regularly to ensure no unauthorized or unintended commands are being executed.
-
Token Management
- Regenerate tokens periodically
- Never share tokens in public repositories
- Use different tokens for different projects
-
Command Restrictions
- Remove commands you don't need
- Avoid PowerShell if possible
- Use specific tools instead of general interpreters
-
Path Restrictions
- Be as specific as possible with allowed paths
- Avoid wildcards when possible
- Never allow access to system directories
-
Monitoring
- Check logs daily
- Set up alerts for suspicious commands
- Review AI assistant interactions
DevProxy is provided "as is" without warranty of any kind. The authors are not responsible for any damage or data loss resulting from the use of this software. By using DevProxy, you acknowledge that you understand the security implications and accept all risks.
MIT License
Kenneth Blossom