The use case: when you're remotely controlling an AI agent and want to preview a file it generated — a development plan, a piece of code, or some log it found — you can have the agent run vibefs allow /path/to/file and send you back an accessible URL. Open it in your browser and you're looking at the file with syntax highlighting.
For large files, the agent can use --head N or --tail N to share only the first or last N lines — useful for checking large log files.
It's not simply a static file server though. A file can only be accessed via URL after the agent explicitly adds it to an allowlist with an expiration time. Each generated link contains a unique short hash — you can't enumerate paths to discover files. This non-permanent whitelist mechanism ensures your local files aren't exposed by accident.
Deployment is straightforward:
1. Set up a Cloudflare Tunnel (or ngrok, Tailscale Funnel, etc.) pointing to local port 17173 2. Add usage instructions to your agent's memory or tools file (see README) 3. uv tool install vibefs
The server daemon starts automatically when a file is first allowed and shuts itself down when all authorizations have expired. Zero resource and management cost.
Happy cooking!