Replies: 1 comment
-
|
Have you tried fixing any of these?... Just thought I'd ask before I give it a go myself. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I ran an security of this git via cc and found this:
ruvnet/ruflo Security Audit
Project: RuFlo v3.5.15 — multi-agent AI orchestration platform (TypeScript/Node.js, SvelteKit UI, Docker Compose, MCP server). Claims "enterprise-grade security" — does not deliver
it.
CRITICAL (4 findings)
HIGH (8 findings)
MEDIUM (10 findings)
MongoDB port 27017 exposed on the Docker host with no auth; Math.random() for session IDs; path traversal via symlink; no inter-node auth in federation; memory search not scoped by
user identity; curl-pipe-bash install with no checksum.
Key Irony
The internal security module (@claude-flow/security/) is actually well-built — bcrypt cost 12, timing-safe comparisons, allowlisted commands. It just isn't applied to the
external-facing MCP bridge or nginx layer.
Do not deploy this to production as-is. The default configuration is exploitable without credentials from anywhere on the network.
Beta Was this translation helpful? Give feedback.
All reactions