We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take the security of gomcp seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Report the vulnerability privately - Do not create a public GitHub issue for security vulnerabilities
- Provide details - Include as much information as possible about the vulnerability
- Allow time - Give us reasonable time to address the issue before any public disclosure
- Don't disclose publicly - Please don't disclose the vulnerability publicly until we've had a chance to address it
- Don't exploit - Don't exploit the vulnerability beyond what's necessary to demonstrate it
-
GitHub Security Advisories (Preferred): Use GitHub's security advisory feature to report vulnerabilities privately.
-
Email: If you prefer email, contact the maintainers directly (check the repository for contact information).
When reporting a vulnerability, please include:
- Type of vulnerability (e.g., injection, authentication bypass, etc.)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability and how an attacker might exploit it
- Initial Response: Within 48 hours, we will acknowledge receipt of your report
- Status Update: Within 7 days, we will provide an initial assessment
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- We will confirm receipt of your vulnerability report
- We will investigate and determine the impact
- We will develop and test a fix
- We will release a patch and publicly disclose the vulnerability (with credit to you, if desired)
When deploying gomcp in production:
- Enable authentication in production environments (
ENABLE_AUTH=true) - Use strong, unique session secrets (
SESSION_SECRET) - Configure OAuth/SSO with trusted identity providers
- Use HTTPS/TLS in production (configure
MCP_SSL_KEYFILEandMCP_SSL_CERTFILE) - Restrict CORS origins to trusted domains
- Use a reverse proxy (nginx, Caddy) for additional security headers
- Never commit
.envfiles with secrets - Use secret management solutions (Vault, AWS Secrets Manager, etc.)
- Rotate secrets regularly
- Run containers as non-root user (already configured in Dockerfile)
- Use read-only file systems where possible
- Scan images for vulnerabilities regularly
- Enable logging and monitor for suspicious activity
- Set up alerts for authentication failures
- Review access logs regularly
- The MCP protocol allows AI models to execute tools - ensure tools are properly sandboxed
- Validate all inputs from MCP clients
- Be cautious with tools that access the filesystem or execute commands
- stdio transport: Only use for local, trusted clients (Claude Desktop)
- HTTP/SSE transport: Always use HTTPS in production
- Validate client certificates when possible
Security updates will be released as patch versions (e.g., 0.1.1, 0.1.2). We recommend:
- Subscribing to GitHub releases for notifications
- Regularly updating to the latest patch version
- Reviewing the CHANGELOG for security-related fixes
We appreciate the security research community's efforts in helping keep gomcp secure. Reporters of valid security issues will be acknowledged in our release notes (unless they prefer to remain anonymous).
Thank you for helping keep gomcp and its users safe!