The PDM is certainly a "lucrative" target due to being a single point of entry to one's whole Proxmox infrastructure, that's actually a big reason for it's a pull based design, i.e., the PDM can be hosted on a secure private location because it will connect to the PVE and PBS hosts, not vice versa. Some how-tos for better practice make sense to have in the midterm, for now I'd recommend blocking all incoming traffic to the PDM that isn't really necessary, using client-side encrypted backups of the PDM host to avoid that access to backups gives access to anything else and potentially also think about using a secure VPN to access remotes through a insecure network (e.g., WireGuard). Making that all a bit more convenient to set up is one of the goals for the midterm though.
Great work

One thing which bothers me: I'm missing documentation on best practices for security and permissions I need to give the API tokens used for the PVE and PBS remotes. Let's say I'm running the datacenter manager and have full admin permissions to the PVE and PBS remotes, then an attacker could take over the PDM instance and also use this to get access to the PVE and PBS infrastructure. Now taking over PVE is not the big deal in my book (yes it might happen, but on the other hand the whole point of the PDM is to have an unified interface for administration so that's a risc...