Pre-158167d versions of this repository (before 2026-03-25) shipped a
docker-compose.yml that contained a hard coded fallback PostgreSQL
password, left the 5432:5432 host port mapping open, and ran Redis
without authentication. That default credential is considered
compromised and must not be reused.
- Upgrade to commit
158167dor newer (theSecurity hardening:commit). - Rotate the PostgreSQL password to a strong per-deployment secret and set
DB_PASSWORDexplicitly in your environment. The current compose file fails fast if the variable is unset. - Set
REDIS_PASSWORDand ensure Redis is not reachable without it. - Do not expose the
5432or6379ports on the public internet. Bind to127.0.0.1only unless you understand the exposure. - Audit your PostgreSQL logs for unknown IPs that authenticated with the old password, and rebuild the database from a verified backup if any are found.
The leak exists in the git history of earlier commits. Treat the original shipped default as a known burned credential and ensure it is not accepted anywhere in your infrastructure.
If you discover a security vulnerability in MEFAI Engine please report it responsibly. Do not open a public GitHub issue for security vulnerabilities.
Contact: security@mefai.io
Please include:
- A description of the vulnerability
- Steps to reproduce the issue
- The potential impact
- Any suggested fixes if you have them
We aim to acknowledge reports within 48 hours and provide a resolution timeline within 5 business days.
- The MEFAI Engine core library (everything under
src/mefai_engine/) - API endpoints exposed by the FastAPI application
- Authentication and authorization logic
- Cryptographic implementations and secret handling
- Database query construction (SQL injection)
- WebSocket connection handling
- Configuration and secret management
- Exchange API credential storage and transmission
- Multi-tenant isolation boundaries
- Vulnerabilities in upstream dependencies (report those to the relevant project)
- Social engineering attacks against MEFAI team members
- Denial of service attacks against hosted infrastructure
- Issues in example scripts or documentation
- Third party exchange API vulnerabilities
- We will work with you to verify and fix the vulnerability before any public disclosure
- We request a 90 day disclosure window from the initial report
- We will credit reporters in our changelog unless they prefer to remain anonymous
- We do not offer monetary bounties at this time but may do so in the future
- Never commit API keys or secrets to version control
- Use environment variables or a secrets manager for all credentials
- Enable testnet mode during development and testing
- Set conservative risk limits before enabling live trading
- Monitor the circuit breaker and audit logs regularly
- Keep all dependencies up to date
- Use the principle of least privilege for database and API access