You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: stateless HTTP cleanup and version bump to 0.6.0
- Fix transport_mode to include 'stdio' in Literal type (fixes CI failures)
- Change contextlib.suppress(BaseException) to suppress(Exception)
- Fix transport_mode field description (was copy-paste error)
- Clean up stateless_http type from bool | None to bool
- Document PURPLEMCP_TRANSPORT_MODE in README
- Update CHANGELOG for 0.6.0 release
-`PURPLEMCP_STATELESS_HTTP` - For use with deployment in Amazon Bedrock Agent Core - Detailed instructions can be found [here](BEDROCK_AGENTCORE_DEPLOYMENT.md)
203
+
-`PURPLEMCP_TRANSPORT_MODE` - MCP transport mode: `stdio` (default), `sse`, or `streamable-http`
204
+
-`PURPLEMCP_STATELESS_HTTP` - Enable stateless HTTP mode for serverless deployments (e.g., Amazon Bedrock AgentCore) - see [deployment guide](BEDROCK_AGENTCORE_DEPLOYMENT.md)
Copy file name to clipboardExpand all lines: SECURITY.md
+2-9Lines changed: 2 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,8 +8,7 @@ This guide documents the security expectations for every contributor and operato
8
8
9
9
-**Project maintainers** provide secure-by-default libraries, tools, and configuration primitives.
10
10
-**Operators and deployers** are responsible for securing runtime environments, network boundaries, secrets, observability pipelines, and user access.
11
-
-**Users running Purple MCP as a remote service** must place the instance behind a reverse proxy (for example, Nginx, Envoy, or an API gateway) that enforces strong authentication and authorization. Purple MCP does not ship its own auth layer.
12
-
-**Hosted MCP offering**: SentinelOne plans to launch an official hosted Purple MCP service in early 2026. Until that release, all external-facing deployments demand operator-managed network controls and authentication.
11
+
-**Users running Purple MCP as a remote service** must place the instance behind a reverse proxy (for example, Nginx, Envoy, or an API gateway) that enforces strong authentication and authorization. Purple MCP does not ship its own auth layer. All external-facing deployments require operator-managed network controls and authentication.
13
12
14
13
## Threat Model Overview
15
14
@@ -60,8 +59,7 @@ This guide documents the security expectations for every contributor and operato
60
59
- Terminate TLS at a reverse proxy that enforces strong client authentication (SAML/OIDC SSO, mutual TLS, signed API tokens).
61
60
- Implement rate limiting, audit logging, and IP allowlists at the proxy layer.
62
61
- Restrict network access to SentinelOne control planes and internal assets required by your workflows.
63
-
- Document all access paths and routinely review who can reach the MCP instance.
64
-
- Upcoming hosted service (early 2026) will provide managed authentication, centralized auditing, and turnkey deployments. Until then, the operator bears full responsibility for access control.
62
+
- Document all access paths and routinely review who can reach the MCP instance. The operator bears full responsibility for access control.
65
63
66
64
## Deployment Guidance
67
65
@@ -86,10 +84,6 @@ This guide documents the security expectations for every contributor and operato
86
84
- Leverage orchestrator features (Kubernetes NetworkPolicies, PodSecurityStandards, IAM roles for service accounts).
87
85
- Inject configuration via secrets and config maps—never bake secrets into container images.
88
86
89
-
### Anticipated Hosted MCP (Early 2026)
90
-
91
-
- A managed SentinelOne-hosted MCP service is planned to launch in early 2026, delivering integrated authentication, network isolation, and operational monitoring.
92
-
93
87
## Logging and Telemetry
94
88
95
89
- Logging is sanitized by default to prevent leakage of queries, tokens, or personally identifiable information.
@@ -136,6 +130,5 @@ This guide documents the security expectations for every contributor and operato
136
130
137
131
-[`CONTRIBUTING.md`](CONTRIBUTING.md) – Development workflow and coding standards.
138
132
-[`README.md`](README.md) – Project overview and setup instructions.
139
-
- SentinelOne internal security policies and the upcoming hosted MCP documentation (target release: early 2026).
140
133
141
134
Security is a continuous effort. Revisit this guide regularly, automate compliance checks where possible, and surface improvements to the team so that Purple MCP remains secure throughout its lifecycle.
0 commit comments