| Version | Supported |
|---|---|
| 0.1.x | ✅ |
All 0.1.x releases of each package in this monorepo (@authplane/sdk, @authplane/mcp, @authplane/fastmcp) receive security patches. Once 1.0 ships, this policy will be revisited.
Please do not open a public GitHub issue for security vulnerabilities.
Instead, use GitHub Private Vulnerability Reporting to submit your report. This ensures:
- Your report is confidential and only visible to maintainers
- We can coordinate a fix before public disclosure
- You receive credit for responsible disclosure
- Which package is affected (
@authplane/sdk,@authplane/mcp,@authplane/fastmcp) and installed version - Description of the vulnerability
- Steps to reproduce (or proof of concept)
- Impact assessment (what an attacker could do)
- Relevant environment details (Node version, framework,
authserverversion if applicable)
- Acknowledgment: within 48 hours
- Initial assessment: within 5 business days
- Fix timeline: depends on severity (critical: < 7 days, high: < 14 days)
Vulnerabilities in the SDK or its adapters that affect correctness of authentication or authorization decisions, including:
- JWT verification bypass (signature, issuer, audience, expiry,
nbf, algorithm confusion) - DPoP proof verification flaws (binding, replay, key mismatch,
htm/htumishandling) - PKCE / state / nonce handling flaws in the OAuth client
- Token replay or confusion between access, refresh, and exchange tokens
- JWKS handling flaws (fetch, caching, key rotation) where the SDK owns the logic
- Leakage of tokens, client secrets, or key material via logs, error messages, or caches
- Dependency-chain vulnerabilities that become exploitable through normal SDK usage
- User integration mistakes (misconfigured issuer URL, missing HTTPS, reused client secrets)
- Issues in the
authserverauthorization server itself — report those at https://github.com/AuthPlane/authserver/security/advisories/new - Issues in
jose,undici, or other third-party dependencies — report upstream, then notify us - Denial of service unless trivially triggerable (< 10 requests)
- Social engineering
For non-vulnerability security questions, open a discussion.