We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 1.0.x | ✓ |
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in EnvCP, please report it by emailing:
Please include:
- Type of vulnerability
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability and how an attacker might exploit it
- Acknowledgment: We will acknowledge your email within 48 hours
- Updates: We will provide regular updates on our progress
- Disclosure: We will work with you to understand and resolve the issue
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity and complexity
- Critical: 1-7 days
- High: 7-30 days
- Medium: 30-90 days
- Low: Best effort
When using EnvCP:
-
Use Strong Passwords
- While EnvCP allows simple passwords, use strong passwords for sensitive data
- Minimum 12 characters with mixed case, numbers, and symbols
-
API Key Protection
- Always set an API key when using HTTP modes
- Keep API keys secret and rotate them regularly
- Use different keys for different environments
-
Access Control
- Enable
allow_ai_active_check: falseto prevent AI from proactively listing variables - Use blacklist patterns to protect sensitive variables
- Review access logs regularly in
.envcp/logs/
- Enable
-
Session Management
- Lock sessions when not in use:
envcp lock - Set reasonable session timeouts (default: 30 minutes)
- Limit session extensions
- Lock sessions when not in use:
-
Storage Security
- Never commit
.envcp/directory to version control - Add
.envcp/to.gitignore - Backup encrypted storage securely
- Use encrypted disk/filesystem when possible
- Never commit
-
Network Security
- When using HTTP modes, bind to localhost only (default: 127.0.0.1)
- Use HTTPS reverse proxy for remote access
- Firewall the port (default: 3456)
-
Updates
- Keep EnvCP updated to the latest version
- Monitor security advisories
- Review changelogs for security fixes
- EnvCP uses AES-256-GCM with PBKDF2-SHA512 (100,000 iterations)
- Security depends on password strength
- Weak passwords can be brute-forced
- Decrypted values are temporarily in memory
- Use session timeouts to limit exposure
- Lock sessions when not needed
- By default, AI cannot proactively list variables
- User must explicitly reference variable names
- Blacklist patterns block sensitive variables completely
- MCP uses stdio (no network exposure)
- HTTP modes require API key authentication
- Auto-detection helps prevent unauthorized access
- Operations are logged for audit
- Logs do not contain variable values
- Review logs regularly for suspicious activity
Security updates will be released as:
- Patch versions (1.0.x) for minor security issues
- Minor versions (1.x.0) for significant security improvements
- Documented in GitHub Security Advisories
EnvCP is designed for local development use. For production or compliance-critical environments:
- Review encryption implementation
- Conduct security audit
- Implement additional controls as needed
- Consider hardware security modules (HSM) for key management
For security concerns: contact@fentz.dev
For general issues: https://github.com/fentz26/EnvCP/issues
We thank the security researchers and community members who help keep EnvCP secure.