We currently support the following versions with security updates:
Version | Supported |
---|---|
1.0.x | ✅ |
We take the security of MCPBuckle seriously. If you believe you've found a security vulnerability, please follow these steps:
- Do not disclose the vulnerability publicly
- Open a security advisory in the GitHub repository
- Provide a detailed description of the vulnerability
- Include steps to reproduce the issue
- If possible, include a proof of concept
- Let us know how you'd like to be credited (if desired)
- We will acknowledge receipt of your vulnerability report within 3 business days
- We will provide an initial assessment of the report within 10 business days
- We will keep you informed about our progress addressing the issue
- Once the vulnerability is fixed, we will publicly acknowledge your responsible disclosure (unless you prefer to remain anonymous)
When using MCPBuckle in your applications, consider the following security best practices:
- API Exposure: Be mindful of what APIs you expose through MCPBuckle. Consider using controller filtering to limit exposed endpoints.
- Sensitive Information: Avoid exposing sensitive information in API descriptions or documentation that will be included in the MCP context.
- Authentication: Consider implementing authentication for the MCP context endpoint in production environments.
- Regular Updates: Keep MCPBuckle and its dependencies up to date to benefit from security fixes.
Thank you for helping keep MCPBuckle and its community safe!