How do we know this isn't honeypot software produced by an adversarial state actor trying to conduct industrial espionage or siphon secret keys, databases and file systems? You're expecting a lot of trust from potential users but making no effort to impart it beyond your blog post that outlines how you made it, which looks suspicious if I'm being honest.
Why have you chosen to protect your anonymity and keep the project closed source?
Either you included your own ssh client (battery included and such) and you'll forever be chasing the features your customers are missing from their client or you just launch the standard ssh client (or psql or whatever) but then, what's the benefit as opposed to some shell configuration?
Genuinely asking, maybe I missed it from the first glance or maybe you could include that on the front page..