LangSight monitors MCP security — it must itself be secure. We take security vulnerabilities seriously.
Do not open a public GitHub issue for security vulnerabilities.
Instead, please report vulnerabilities through one of these channels:
- GitHub Security Advisories (preferred): Create a security advisory
- Email: security@langsight.dev (if the above is not available)
- Description of the vulnerability
- Steps to reproduce
- Affected version(s)
- Impact assessment (what can an attacker do?)
- Suggested fix, if you have one
- Acknowledgment: within 48 hours
- Initial assessment: within 7 days
- Fix timeline: depends on severity
- Critical: patch within 72 hours
- High: patch within 14 days
- Medium/Low: next release cycle
| Version | Supported |
|---|---|
| 0.2.x | Yes |
| < 0.2 | No |
- Dashboard: NextAuth.js with bcrypt-hashed passwords and JWT sessions
- API/SDK: SHA-256 hashed API keys with HMAC-safe comparison
- Proxy trust boundary: X-User-* headers only trusted from configurable CIDR ranges
- Passwords are bcrypt-hashed (never stored in plaintext)
- API keys are SHA-256 hashed (raw key shown once at creation, never stored)
- Audit log records all admin mutations with actor identity and IP
- PII is never logged via structlog
- No SSO/OIDC support yet (password-only authentication)
- No encryption at rest for ClickHouse data
- Rate limiting is IP-based (with X-Forwarded-For support for proxy deployments)
- 5 of 10 OWASP MCP checks are implemented
- Dependencies are pinned in
pyproject.toml - CVE scanning uses the OSV (Open Source Vulnerabilities) database
- Run
uv auditto check for known vulnerabilities