MiniStack is designed exclusively for local development and CI/CD testing.
Do not expose MiniStack to the internet or any untrusted network.
- It has no authentication — any request is accepted
- Credentials (
aws_access_key_id,aws_secret_access_key) are ignored - All data is stored in-memory and is not encrypted
- The Docker socket mount (for ECS/RDS/ElastiCache) gives container-level access to your host
If you find a security issue that could affect users running MiniStack in a way that exposes their host system or data, please open a GitHub issue tagged security.
Since this is a local dev tool with no auth by design, most "vulnerabilities" are intentional trade-offs for simplicity. But if you find something that could cause unintended host compromise (e.g. path traversal in S3 persistence, command injection in Lambda execution), please report it.
# docker-compose.yml — bind to localhost only, never 0.0.0.0 on a shared machine
ports:
- "127.0.0.1:4566:4566"Never run with S3_PERSIST=1 pointing to sensitive directories.