| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security issues seriously. If you discover a security vulnerability in the m2m-mcp-server-ssh-server, please follow these steps:
- Do not disclose the vulnerability publicly
- Email us at support@machinetomachine.ai with details about the vulnerability
- Allow us time to investigate and address the vulnerability
- We will coordinate the public disclosure with you once the issue is resolved
When deploying m2m-mcp-server-ssh-server:
-
Network Security:
- Avoid binding the key server to all interfaces (0.0.0.0) unless necessary
- Use a reverse proxy (Nginx) with HTTPS for the key server in production
- Configure firewalls to limit access to SSH (port 8022) and key server (port 8000) endpoints
-
SSH Security:
- Generate dedicated server SSH keys with appropriate permissions (600 for private keys on Unix systems)
- Store client keys securely in the database or authorized_keys file
- Use passphrase-protected keys where possible
-
Deployment Security:
- Run the server with the least privileged user possible