Skip to content

Security: operaton/operaton-mcp

Security

SECURITY.md

Security Policy

Supported Versions

The following versions of operaton-mcp currently receive security updates:

Version Supported
1.x.x

Reporting a Vulnerability

Please do not report security vulnerabilities through public GitHub issues.

Use GitHub Security Advisories to disclose vulnerabilities privately.

When submitting a report, please include:

  • A clear explanation of the vulnerability and its potential consequences
  • Affected versions and your system environment
  • Step-by-step reproduction instructions, with proof-of-concept code or screenshots if available
  • Your contact information for follow-up questions
  • Your attribution preferences (credit, anonymous, or no mention)

Response Process

We are a volunteer-led open-source project. While we do not offer a formal SLA, we aim to:

  1. Acknowledge your report within a few days of receipt.
  2. Investigate the issue and keep you informed of progress.
  3. Release a fix as soon as a patch is ready; security fixes are prioritised over feature work.
  4. Publish a GitHub Security Advisory once the fix is available, crediting the reporter on request.

Scope

In Scope

  • Vulnerabilities in the operaton-mcp source code
  • Issues in the build or release process that could compromise artifact integrity
  • Security issues in official npm releases

Out of Scope

  • Denial-of-service attacks against the Operaton REST API itself
  • Vulnerabilities in third-party libraries (report those to the relevant upstream project)
  • Social engineering attacks
  • Local exploits that do not involve privilege escalation

Legal

operaton-mcp is released under the Apache License 2.0. It is maintained by volunteers on a best-effort basis. There are no contractual commitments or service-level agreements of any kind. By participating in responsible disclosure, you agree that your report will be handled in good faith.

There aren’t any published security advisories