The MCP Server Builder Platform is designed with security as a top priority. This document outlines our security practices, policies, and how to report security vulnerabilities.
We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 1.0.x | β |
| < 1.0 | β |
- Input Validation: All user inputs are validated and sanitized
- No Sensitive Data Storage: Credentials and sensitive information are never stored in browser storage
- Configuration Security: Generated configurations include placeholders for sensitive data
- XSS Prevention: React's built-in XSS protection, plus additional sanitization
- CSRF Protection: Stateless architecture eliminates CSRF vulnerabilities
- Dependency Scanning: Regular automated dependency vulnerability scans
- Code Analysis: Static code analysis to detect security issues
- Minimal Dependencies: Reduced attack surface through minimal dependencies
- Secure Build Process: Verified and signed builds
- HTTPS Required: All production deployments must use HTTPS
- Content Security Policy: Recommended CSP headers included
- Secure Headers: Security headers configuration provided
- Container Security: Docker images built with security best practices
- Never Commit Secrets: Do not commit API keys, tokens, or passwords to version control
- Use Environment Variables: Store sensitive configuration in environment variables
- Rotate Credentials: Regularly rotate API keys and access tokens
- Least Privilege: Configure integrations with minimal required permissions
- Use HTTPS: Always deploy over HTTPS in production
- Update Regularly: Keep the platform and dependencies up to date
- Monitor Access: Log and monitor access to your MCP servers
- Network Security: Use firewalls and network security groups appropriately
- Validate Inputs: Ensure your MCP servers validate all inputs
- Sanitize Outputs: Sanitize data before exposing it
- Audit Logs: Implement comprehensive audit logging
- Access Control: Implement proper authentication and authorization
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
- DO NOT open a public GitHub issue for security vulnerabilities
- Email security reports to: security@pangerlkr.link
- Include detailed information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours of your report
- Initial Assessment: Within 1 week
- Status Updates: Regular updates on progress
- Resolution Timeline: Depends on severity
- Critical: 24-48 hours
- High: 1 week
- Medium: 2-4 weeks
- Low: 4-8 weeks
- We follow coordinated disclosure
- We will work with you to understand and address the issue
- We request 90 days before public disclosure
- We will credit researchers (if desired) in our security advisories
We recognize and thank security researchers who responsibly disclose vulnerabilities:
- Enable HTTPS with valid SSL/TLS certificate
- Configure Content Security Policy headers
- Set up security headers (HSTS, X-Frame-Options, etc.)
- Review and configure CORS policies
- Scan for vulnerabilities in dependencies
- Review application logs configuration
- Set up monitoring and alerting
- Verify HTTPS is enforced
- Test security headers are present
- Verify CSP is working correctly
- Test authentication and authorization
- Monitor for unusual activity
- Set up automated security scanning
- Document incident response procedures
- Dependency Updates: Automated weekly dependency updates
- Security Patches: Released as needed for vulnerabilities
- Version Updates: Following semantic versioning
Subscribe to security updates:
- GitHub Watch β Custom β Security alerts
- RSS feed:
https://github.com/pangerlkr/mcp-rep/security/advisories.atom - Email: Subscribe at security@example.com
We regularly audit and update third-party dependencies:
- Automated dependency scanning with Dependabot
- Regular manual security reviews
- Prompt patching of known vulnerabilities
Third-party MCP servers are:
- Not directly controlled by this project
- Subject to their own security policies
- Recommended to be audited independently
- Should be kept up to date
For security-related inquiries:
- Email: security@example.com
- PGP Key: [Available on request]
- Response Time: Within 48 hours
For general support:
- GitHub Issues: For non-security bugs
- Discussion: For questions and feature requests
This project aims to comply with:
- OWASP Top 10 (2021)
- NIST Cybersecurity Framework
- CIS Controls
- General security best practices
Currently pursuing:
- SOC 2 Type II (planned)
- ISO 27001 (planned)
The following are in scope for vulnerability reports:
- The MCP Server Builder web application
- Build and deployment configurations
- Official Docker images
- Documentation that could lead to security issues
The following are out of scope:
- Third-party MCP server implementations
- Issues in third-party dependencies (report to the maintainers)
- Social engineering attacks
- Physical attacks
We will not pursue legal action against security researchers who:
- Act in good faith
- Follow this disclosure policy
- Do not access or modify data without authorization
- Do not degrade service availability
Last Updated: 2024-02-18
Thank you for helping keep the MCP Server Builder Platform and our community safe!