You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: SECURITY.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,18 +13,18 @@ Include the following information in your report:
13
13
-**Description**: A clear explanation of the vulnerability, with reproduction steps if possible.
14
14
-**Environment**: Operating system, Python version, MCP client, and any relevant setup details.
15
15
16
-
Send reports to: **simon.gilbert.provost@gmail.com**
16
+
Send reports to: **simon.gilbert.provost@gmail.com**
17
17
18
18
We will acknowledge receipt within 7 days and aim to provide a resolution or mitigation timeline within 30 days. Please do not share vulnerabilities publicly until a fix has been released.
19
19
20
20
## Scope and Considerations
21
21
22
-
-**Tool Combinations**: MCPStack-Tool-Builder is designed to compose with other MCP tools. Unexpected or unsafe interactions between tools cannot be predicted or prevented at the MCPStack-Tool level. The responsibility for safe orchestration rests with the user.
23
-
-**Data Breach Risks**: MCPStack-Tool-Builder runs locally and does not send data to external services. There are no cloud communications by default, so conventional remote data breaches do not apply.
22
+
-**Tool Combinations**: MCPStack-Tool-Builder is designed to compose with other MCP tools. Unexpected or unsafe interactions between tools cannot be predicted or prevented at the MCPStack-Tool level. The responsibility for safe orchestration rests with the user.
23
+
-**Data Breach Risks**: MCPStack-Tool-Builder runs locally and does not send data to external services. There are no cloud communications by default, so conventional remote data breaches do not apply.
24
24
-**GitHub Issues and Pull Requests**: Do not upload sensitive data (such as private datasets, logs, or credentials) when filing issues or submitting pull requests. Use synthetic or anonymized examples instead.
25
25
26
26
## Good Practices
27
27
28
-
- Keep dependencies updated.
29
-
- Test tool compositions in a controlled environment.
30
-
- Sanitize any shared examples when discussing issues publicly.
28
+
- Keep dependencies updated.
29
+
- Test tool compositions in a controlled environment.
30
+
- Sanitize any shared examples when discussing issues publicly.
0 commit comments