GHSA-8pqq-224h-x875

Suggest an improvement
Source
https://github.com/advisories/GHSA-8pqq-224h-x875
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-8pqq-224h-x875/GHSA-8pqq-224h-x875.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8pqq-224h-x875
Published
2026-05-05T00:03:48Z
Modified
2026-05-05T16:12:40.053729Z
Summary
ogham-mcp had credentials embedded in published PyPI sdists -- Neon postgres URLs and Voyage API key
Details

Summary

Between 2026-02 and 2026-04-24 a total of 22 public PyPI sdists of ogham-mcp contained development credentials embedded in source files. All credentials have since been rotated on the respective providers. No known exploitation. Upgrade to v0.11.1 to get a clean release.

What was leaked

| Credential | Location in sdist | Vulnerable range | Count | |---|---|---|---| | 3x Neon postgres URLs with passwords (US / EU / AP development databases) | top-level Makefile (NEON_US, NEON_EU, NEON_AP vars) | >=0.6.5, <0.11.0 | 21 sdists | | 1x Voyage AI API key (pa-...) | tests/test_hooks.py::test_mask_secrets_key_value -- test fixture that fed a real key into the redaction-function tester | >=0.6.3, <0.11.1 | 22 sdists |

Impact

  • Primary risk: any consumer of the affected sdists could have extracted the credentials and used them. The Neon URLs pointed at development databases; the Voyage key was a rate-limited API key.
  • Observed exploitation: none detected. Audit logs on both providers were reviewed post-rotation.
  • Remediation on our side:
    • Neon passwords for all three regions rotated.
    • Voyage API key rotated.
    • All affected versions yanked from PyPI (v0.3.0 through v0.10.4 yanked on 2026-04-24; v0.11.0 pending yank after this advisory).
    • v0.11.0 removed the Neon URLs and introduced make publish-check which scans every sdist for credential patterns before upload.
    • v0.11.1 scrubs the Voyage key from the test fixture and excludes benchmarks/, docs/, research/, extras/, and **/*.env* from all future sdists via explicit hatchling sdist include/exclude in pyproject.toml.

Action for users

  • If users installed any version from v0.3.0 through v0.11.0, upgrade to v0.11.1 immediately:
    pip install --upgrade "ogham-mcp>=0.11.1"
    
  • Users do not need to rotate anything on their end. The leaked credentials were owned by the project maintainer, not by users.

Credit

Discovered during an internal pre-release audit on 2026-04-24 while preparing v0.11.1.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-05-05T00:03:48Z",
    "cwe_ids": [
        "CWE-798"
    ],
    "severity": "MODERATE",
    "nvd_published_at": null
}
References

Affected packages

PyPI / ogham-mcp

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.6.3
Fixed
0.11.1

Affected versions

0.*
0.6.3
0.6.4
0.6.5
0.6.6
0.6.7
0.6.8
0.6.9
0.7.0
0.8.0
0.8.1
0.8.2
0.8.3
0.8.4
0.8.5
0.8.6
0.9.0
0.9.1
0.9.2
0.10.0
0.10.1
0.10.2
0.10.3
0.10.4
0.11.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-8pqq-224h-x875/GHSA-8pqq-224h-x875.json"