This software is in beta and has not yet been subject to formal security audit. It may lack adequate user input validation or other features.
Therefore, gone is only intended for use on a secure network with trusted devices, such as a private LAN.
- basic authentication (via header or form field)
- delay "tarpit" applied to requests failing auth
- robust audit logging with time and event detail
- files stored, indexed with randomly-selected id
- global request rate limiting (via auth package)