Between 2026-02 and 2026-04-24 a total of 22 public PyPI sdists of ogham-mcp contained development credentials embedded in source files. All credentials have since been rotated on the respective providers. No known exploitation. Upgrade to v0.11.1 to get a clean release.
| Credential | Location in sdist | Vulnerable range | Count |
|---|---|---|---|
| 3x Neon postgres URLs with passwords (US / EU / AP development databases) | top-level Makefile (NEON_US, NEON_EU, NEON_AP vars) | >=0.6.5, <0.11.0 | 21 sdists |
| 1x Voyage AI API key (pa-...) | tests/test_hooks.py::test_mask_secrets_key_value -- test fixture that fed a real key into the redaction-function tester | >=0.6.3, <0.11.1 | 22 sdists |
make publish-check which scans every sdist for credential patterns before upload.benchmarks/, docs/, research/, extras/, and **/*.env* from all future sdists via explicit hatchling sdist include/exclude in pyproject.toml.v0.3.0 through v0.11.0, upgrade to v0.11.1 immediately:
pip install --upgrade "ogham-mcp>=0.11.1"
Discovered during an internal pre-release audit on 2026-04-24 while preparing v0.11.1.
{
"github_reviewed": true,
"github_reviewed_at": "2026-05-05T00:03:48Z",
"cwe_ids": [
"CWE-798"
],
"severity": "MODERATE",
"nvd_published_at": null
}