Skip to content

Conversation

@A-Isnandar
Copy link

Description
This PR addresses critical security vulnerabilities in the default configuration file (.env.example).

Changes:

  1. Security Hardening: Changed AP_EXECUTION_MODE from UNSANDBOXED to SANDBOXED to mitigate Remote Code Execution (RCE) risks by default.
  2. Secrets Sanitization: Removed all hardcoded values for AP_API_KEY, AP_ENCRYPTION_KEY, AP_JWT_SECRET, and other credentials. Replaced them with secure placeholders (CHANGE_ME_IN_PRODUCTION).

Related Issue
Closes #373

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Critical] Insecure Default Configuration: RCE Risk via UNSANDBOXED Mode & Hardcoded Secrets

1 participant