Security
Reporting vulnerabilities
If you discover a security vulnerability in Meridian:
- Do NOT open a public issue
- Email the maintainer or use GitHub Security Advisories
- Include steps to reproduce and potential impact
We aim to respond within 48 hours and will credit reporters in the fix.
Security design
- Credentials: stored with
0600permissions, secrets never passed through shell commands withoutshlex.quote(), redacted frommeridian doctoroutput - Panel access: reverse-proxied by Caddy at a secret HTTPS path in all modes — no SSH tunnel required
- SSH: password authentication disabled by default
- Firewall: UFW configured with deny-all-incoming, only ports 22, 80, and 443 opened
- Docker: 3x-ui image pinned to a tested version
- TLS: Caddy handles certificates automatically via Let’s Encrypt
Scope
Meridian configures proxy servers — it does not implement cryptographic protocols. The underlying security depends on: