| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We take the security of MCP GitLab seriously. If you have discovered a security vulnerability, please follow these steps:
- DO NOT create a public GitHub issue for security vulnerabilities
- Send details to the maintainers through a private channel
- Include the following information:
- Type of vulnerability
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue
- Acknowledgment of your report within 48 hours
- A more detailed response within 7 days
- Regular updates on the progress
- Credit in the fix announcement (unless you prefer to remain anonymous)
When using MCP GitLab:
- Never commit tokens: Store GitLab tokens in environment variables
- Use minimal scopes: Only grant the permissions your application needs
- Rotate tokens regularly: Update your tokens periodically
- Use OAuth when possible: Prefer OAuth tokens over personal access tokens
Required environment variables should be set securely:
export GITLAB_PRIVATE_TOKEN="your-token-here" # Never commit this
export GITLAB_URL="https://gitlab.com" # Or your GitLab instance- Store sensitive configuration in
.envfiles (not tracked by git) - Use
.env.examplefor configuration templates without secrets - Review dependencies regularly for known vulnerabilities
MCP GitLab includes several security features:
- Token validation: Validates GitLab tokens before use
- Rate limiting: Respects GitLab API rate limits
- Error sanitization: Sanitizes error messages to avoid token leaks
- Secure defaults: Uses HTTPS by default for API calls
- Input validation: Validates and sanitizes user inputs
We regularly update dependencies to patch known vulnerabilities:
- Automated dependency updates via Dependabot
- Security scanning in CI/CD pipeline
- Regular security audits with
pip-auditandsafety
When we receive a security report, we will:
- Confirm the problem and determine affected versions
- Audit code to find similar problems
- Prepare fixes for all supported versions
- Release new security fix versions
- Announce the vulnerability after the fix is released
For security concerns, please contact the maintainers through GitHub.
We thank all security researchers who responsibly disclose vulnerabilities to us.