If you discover a security vulnerability in this repository, please report it privately via GitHub Security Advisories rather than opening a public issue.
These scripts are designed for RMM deployment. Never hardcode credentials directly into scripts.
- Use RMM platform variables - Most RMM platforms support secure variable injection (e.g.,
$siteToken,$env:API_KEY) - Environment variables - Scripts fall back to environment variables when RMM injection isn't available
- Review before deploying - Always audit scripts before running in production
| Script | Sensitive Input | Recommended Method |
|---|---|---|
sentinelone_install.ps1 |
Site token | RMM secure variable |
huntress_install_macos.sh |
Account/Org keys | Environment variables |
dokploy_deploy_running_apps.sh |
API token | Environment variable |
gcpw_install.ps1 |
Enrollment token | RMM secure variable |
superops_agent_install.ps1 |
Agent URL | RMM environment variable |
This repository intentionally excludes:
- API keys, tokens, or passwords
- Customer data or internal URLs
- Private configuration files
- Environment-specific settings
All scripts in this repository:
- Avoid dangerous patterns like
Invoke-Expressionwith remote content - Include
$ErrorActionPreference = 'Stop'for fail-fast behavior - Document security considerations in their README headers
- Use exit codes for proper RMM status reporting