| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them through GitHub Security Advisories.
- Type of issue (e.g., command injection, path traversal, WebSocket authentication bypass)
- Full paths of source file(s) related to the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact assessment
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix and disclosure: Within 30 days for critical issues
- WebSocket transport: Currently accepts any local connection on the configured port. Authentication is planned for a future release.
- Python script execution: Scripts execute with full UE editor privileges. The
validate_path()utility should be used for all file/asset path inputs. - File operations: Sandboxed to the project directory via
utils.pypath validation.
- Only run the MCP server on trusted local networks
- Keep Node.js and dependencies updated
- Review Python scripts before execution in production environments
- Use the approval gate for destructive operations
This security policy is adapted from common open-source security policy templates.