Replies: 3 comments
-
|
Have you tried fixing any of these?... Just thought I'd ask before I give it a go myself. |
Beta Was this translation helpful? Give feedback.
-
|
im unable to download zip due to virus |
Beta Was this translation helpful? Give feedback.
-
|
Your security concerns are well-founded. We ran an independent audit and found additional issues beyond what you've listed: Security findings from our audit:
The security audit in issue #1375 was closed by the maintainer. The concerns remain unaddressed in v3.5.51. Full audit: Independent Audit |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I ran an security of this git via cc and found this:
ruvnet/ruflo Security Audit
Project: RuFlo v3.5.15 — multi-agent AI orchestration platform (TypeScript/Node.js, SvelteKit UI, Docker Compose, MCP server). Claims "enterprise-grade security" — does not deliver
it.
CRITICAL (4 findings)
HIGH (8 findings)
MEDIUM (10 findings)
MongoDB port 27017 exposed on the Docker host with no auth; Math.random() for session IDs; path traversal via symlink; no inter-node auth in federation; memory search not scoped by
user identity; curl-pipe-bash install with no checksum.
Key Irony
The internal security module (@claude-flow/security/) is actually well-built — bcrypt cost 12, timing-safe comparisons, allowlisted commands. It just isn't applied to the
external-facing MCP bridge or nginx layer.
Do not deploy this to production as-is. The default configuration is exploitable without credentials from anywhere on the network.
Beta Was this translation helpful? Give feedback.
All reactions