If you discover a security vulnerability in MEFAI Engine please report it responsibly. Do not open a public GitHub issue for security vulnerabilities.
Contact: security@mefai.io
Please include:
- A description of the vulnerability
- Steps to reproduce the issue
- The potential impact
- Any suggested fixes if you have them
We aim to acknowledge reports within 48 hours and provide a resolution timeline within 5 business days.
- The MEFAI Engine core library (everything under
src/mefai_engine/) - API endpoints exposed by the FastAPI application
- Authentication and authorization logic
- Cryptographic implementations and secret handling
- Database query construction (SQL injection)
- WebSocket connection handling
- Configuration and secret management
- Exchange API credential storage and transmission
- Multi-tenant isolation boundaries
- Vulnerabilities in upstream dependencies (report those to the relevant project)
- Social engineering attacks against MEFAI team members
- Denial of service attacks against hosted infrastructure
- Issues in example scripts or documentation
- Third party exchange API vulnerabilities
- We will work with you to verify and fix the vulnerability before any public disclosure
- We request a 90 day disclosure window from the initial report
- We will credit reporters in our changelog unless they prefer to remain anonymous
- We do not offer monetary bounties at this time but may do so in the future
- Never commit API keys or secrets to version control
- Use environment variables or a secrets manager for all credentials
- Enable testnet mode during development and testing
- Set conservative risk limits before enabling live trading
- Monitor the circuit breaker and audit logs regularly
- Keep all dependencies up to date
- Use the principle of least privilege for database and API access