How do we know this isn't honeypot software produced by an adversarial state actor trying to conduct industrial espionage or siphon secret keys, databases and file systems? You're expecting a lot of trust from potential users but making no effort to impart it beyond your blog post that outlines how you made it, which looks suspicious if I'm being honest.
Why have you chosen to protect your anonymity and keep the project closed source?
I can completely understand your concern, however, many tools these days we use are closed source (warp, cursor, sublime text, termius).
I am the creator, Jefferson Hale. Here is my linkedin: https://linkedin.com/in/jeffyaw
I'm in the United States. Lake Arrowhead, CA to be precise.
Either you included your own ssh client (battery included and such) and you'll forever be chasing the features your customers are missing from their client or you just launch the standard ssh client (or psql or whatever) but then, what's the benefit as opposed to some shell configuration?
Genuinely asking, maybe I missed it from the first glance or maybe you could include that on the front page..
windows/linux: ctrl+shift+S
mac: cmd+shift+S
Opens the ssh connection manager. And yes, it just uses the standard ssh, psql, mysql (etc) clients. The benefit is just clicking a button to connect. This could also be done with many different strategies. bash_aliases, ssh_config. But for a nice gui and button push UX this is what is provided. Also, if connecting through yaw there is a handy Remote Sessions gui (ctrl+shift+R) to interface with tmux or screen sessions easily.