Security
Planned coverage:
- Proxy authentication (basic auth, OAuth2)
- TLS modes — insecure, self-signed, managed certificate
- Network exposure — what’s published to the host, what’s internal to the bridge network
- License file handling
- Credential storage
- Recommendations for production deployments