MUD Security Hardening Checklist
Most MUD incidents come from basic gaps: weak admin access, missing backups, noisy logs, and legacy code assumptions. Use this checklist before public launch and after every major infrastructure change.
Admin Access Control
0/5Require SSH keys for all admins
criticalDisable password-based SSH access and rotate keys when staff changes.
Separate immortal and host credentials
criticalDo not reuse in-game passwords for shell, database, or panel access.
Review privileged accounts monthly
recommendedConfirm only active staff retain shell, deploy, or backup permissions.
Protect sudo access
criticalLimit full host administration to the smallest possible number of maintainers.
Document emergency lockout steps
recommendedKeep a tested process for revoking access if an account is compromised.
Host and Network Baseline
0/5Restrict open ports
criticalExpose only the game port, SSH, and any intentionally public web services.
Apply OS security updates
criticalPatch the host on a predictable schedule so known package issues do not linger.
Enable basic rate limiting
recommendedThrottle repeated connection attempts and obvious abuse at the firewall or gateway layer.
Run the game as a dedicated user
criticalAvoid running the MUD process as root or under a shared system account.
Validate restart behavior
recommendedConfirm crashes and host reboots do not leave stale sockets or unsafe temp files behind.
Player Data and Persistence
0/5Hash player passwords
criticalStore password hashes instead of plaintext or reversible secrets.
Back up player files daily
criticalProtect characters, boards, account data, and configs with automated backups.
Limit sensitive log content
criticalAvoid writing passwords, tokens, or private admin notes into general logs.
Review file permissions
recommendedEnsure only the game service user and trusted admins can read persistent world data.
Test backup restore
criticalPerform a restore drill so backups are proven usable before an emergency.
Code and Exploit Prevention
0/5Audit unsafe input handling
criticalReview command parsing, buffer handling, and copy routines in older C code paths.
Lock down builder-only commands
criticalVerify OLC, reload, and debug commands cannot be reached by normal players.
Review duping and economy exploits
recommendedTest rent, corpses, shops, containers, and copyover flows for item duplication.
Validate rate-sensitive commands
recommendedThrottle spammy commands such as who, score, or auction if they stress the server.
Track third-party integrations
recommendedReview any bots, web endpoints, or webhook consumers that can issue privileged actions.
Monitoring and Incident Response
0/5Alert on failed login spikes
recommendedNotice brute-force attempts or bot traffic before they turn into downtime.
Keep structured admin logs
recommendedCapture restarts, bans, object restores, and sensitive commands in a searchable format.
Prepare a player-facing outage notice
optionalHave short copy ready for login banners, Discord, or forums during a security event.
Document first-hour response steps
criticalList how to isolate the host, preserve evidence, and restore safe service quickly.
Run a quarterly security review
recommendedRecheck access, logs, backups, and exploit tests on a regular calendar.