Security Considerations
This page is a practical checklist for running SPX safely in dev and CI environments.
Product key handling
Treat
SPX_PRODUCT_KEYas a secret.Do not commit it to git or bake it into images.
Prefer
.envlocally and CI secrets in pipelines.
Network exposure
Do not expose the SPX Server API (
8000) to the public internet.Bind protocol ports only when needed (Modbus/SCPI/MQTT/etc.) and prefer private networks/VPNs.
Container hygiene
Pin image tags in
docker-compose.ymlfor reproducible builds.Keep dependencies for custom extensions explicit (
requirements.txtnext to extension code, where applicable).
Last updated

