Version | Supported |
---|---|
1.0.x | ✅ |
We take security vulnerabilities seriously. If you discover a security vulnerability in MCP jq Server, please report it privately.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report vulnerabilities by:
- Email: Send details to [[email protected]] with subject "Security Vulnerability - MCP jq Server"
- GitHub Security Advisory: Use GitHub's private vulnerability reporting feature
Please include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Suggested fix (if you have one)
- Your contact information for follow-up
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity, typically within 30 days
This project involves:
- Command execution: The server executes
jq
commands with user input - File system access: The server can read JSON files from the file system
- Input validation: User JSON data and jq filters are processed
When deploying MCP jq Server:
- Restrict file access: Limit the directories the server can access
- Validate input: Consider additional input validation for untrusted sources
- Run with minimal privileges: Use a dedicated user account with limited permissions
- Monitor usage: Log and monitor jq command execution
- Keep dependencies updated: Regularly update Node.js and npm packages
- The server executes jq commands directly - complex or malicious jq expressions could potentially impact performance
- File paths are validated but should be restricted to expected directories in production
- No built-in rate limiting - consider implementing this at the client level
Thank you for helping keep MCP jq Server secure!