| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via one of these methods:
-
GitHub Security Advisories (Preferred)
- Go to the Security tab
- Click "Report a vulnerability"
- Fill out the form with details
-
Email
- Send details to the repository owner
- Include "SECURITY" in the subject line
- Type of issue (e.g., command injection, credential exposure, etc.)
- Full paths of source file(s) related to the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue
- Initial response: Within 48 hours
- Status update: Within 7 days
- Fix timeline: Depends on severity
- Critical: 24-72 hours
- High: 1-2 weeks
- Medium: 2-4 weeks
- Low: Next release
- Never commit credentials - Use environment variables
- Use
.envfiles - Keep them in.gitignore - Rotate API keys - Regularly rotate trading platform keys
- Limit permissions - Use read-only keys when possible
- Keep dependencies updated - Run
npm auditregularly - Use HTTPS - Never expose HTTP endpoints publicly
- Enable rate limiting - Protect against abuse
- Review logs - Monitor for suspicious activity
- Start with dry-run mode - Test before live trading
- Set loss limits - Configure circuit breakers
- Use separate wallets - Don't use primary wallets for bots
- Monitor positions - Set up alerts for large trades
Clodds supports ERC-8004 for on-chain agent identity verification. This prevents impersonation attacks where malicious actors claim to be trusted traders.
Why it matters: On January 29, 2026, an agent named "samaltman" attempted to hijack bots via prompt injection. Anyone can claim to be anyone without verification.
Recommended settings for copy trading:
{
requireVerifiedIdentity: true, // Only copy verified traders
minReputationScore: 50, // Minimum reputation score
identityNetwork: 'base' // Mainnet (live Jan 29, 2026)
}Live networks: Ethereum, Base, Optimism, Arbitrum, Polygon (19,000+ agents registered)
See /verify command and src/identity/erc8004.ts for implementation.
All npm vulnerabilities have been fixed using npm overrides:
- bigint-buffer → @vekexasia/bigint-buffer2 (secure fork)
- elliptic → Replaced with @noble/secp256k1 (modern, audited)
- axios → Forced to ^1.7.4
- undici → Forced to ^6.23.0
- nanoid → Forced to ^3.3.8
- @cosmjs/** → Forced to ^0.38.1 (uses @noble/curves)
Run npm audit to verify: 0 vulnerabilities
The following features are disabled by default for security:
| Feature | Environment Variable | Default |
|---|---|---|
| JavaScript sandbox | ALLOW_UNSAFE_SANDBOX |
false |
| Canvas JS eval | CANVAS_ALLOW_JS_EVAL |
false |
Only enable these if you understand the risks. For untrusted code execution, use Docker containers or isolated-vm.
Production deployments should enable:
# IP-based rate limiting (requests per minute)
CLODDS_IP_RATE_LIMIT=100
# HTTPS enforcement
CLODDS_FORCE_HTTPS=true
CLODDS_HSTS_ENABLED=trueSee docs/SECURITY_AUDIT.md for the full security audit report.