Currently llama-swap listens on all network interfaces, meaning anyone on the same network as the hosting PC can connect to the llama-swap service. this is potentially problematic for some users because:
- it is never disclosed to users it is being served outside their local PC, potentially creating unintended security/privacy issues.
- outside users can submit any POST/GET request including the ability to read logs, or existing chat/completions activity
- By default llama-swap has no authentication.
I recommend we switch to listen on 127.0.0.1:8080 as default behavior to keep things private by default, and instead provide users instructions on how to open access more widely if they desire.
Currently llama-swap listens on all network interfaces, meaning anyone on the same network as the hosting PC can connect to the llama-swap service. this is potentially problematic for some users because:
I recommend we switch to listen on 127.0.0.1:8080 as default behavior to keep things private by default, and instead provide users instructions on how to open access more widely if they desire.