This repository handles exchange API keys, signed requests, and potentially sensitive account or trading data.
If you discover a security issue, credential leak, unsafe signing path, or sensitive-data exposure, do not open a public issue with exploit details.
Instead:
- Share a private report with the maintainer through GitHub security advisories if enabled.
- If that is not available, contact the maintainer directly and include enough detail to reproduce the problem safely.
- Avoid sending live API keys, API secrets, reusable session data, or raw account exports unless explicitly requested through a secure channel.
- affected component or path
- impact
- steps to reproduce
- whether live credentials are required
- suggested mitigation if known
Never commit:
- API keys or API secrets
.envfiles- logs containing
X-BAPI-*headers - account exports or order-history dumps
- raw private WebSocket payloads
- production trading scripts with live account identifiers
Those files should stay local and ignored.