We at Mozilla AI take the security of our projects seriously. We appreciate your efforts to responsibly disclose security vulnerabilities.
This document outlines the process for reporting vulnerabilities in mcpd
.
The following versions are currently supported for security updates:
Version | Supported |
---|---|
0.0.x | ✅ |
Please ensure you are using a supported version when reporting a vulnerability.
Please DO NOT open a public GitHub issue.
To report a security vulnerability, please send a detailed email to: [email protected]
Please include the following information in your report:
- Project Name and Version: Specify which project (
mozilla-ai/mcpd
) and which version(s) are affected. - Vulnerability Description: A clear and concise description of the vulnerability.
- Steps to Reproduce: Detailed steps to reproduce the vulnerability, including any necessary code, configuration, or environment details.
- Impact: Describe the potential impact of the vulnerability (e.g., data breach, denial of service, privilege escalation).
- Proof of Concept (Optional but Recommended): Any proof-of-concept code or demonstration that helps us understand and verify the vulnerability. If you have this in a repository please ensure it is private, we can privately discuss granting access to specific Mozilla AI employees for review.
- Your Contact Information (Optional): If you wish to be credited for your discovery, please provide your name/handle and preferred contact method.
- We will acknowledge receipt of your report within 2 business days.
- We will investigate the report promptly and provide an initial assessment within 5 business days.
- We will keep you informed of our progress throughout the vulnerability resolution process.
- Once the vulnerability is patched, we will notify you and, with your permission, include your name in our release notes or security advisory as a thank you for your responsible disclosure.
- We follow a 'coordinated disclosure' approach, meaning we aim to have a fix available before public disclosure.
Please allow us a reasonable amount of time to address the vulnerability before public disclosure. We request that you do not disclose the vulnerability publicly until we have confirmed a fix is available and have agreed on a disclosure timeline.
Our typical disclosure timeline for critical issues is up to 30 days from the initial report, but this may vary depending on complexity.
This security policy applies to all components of mcpd (for example: mcpd-sdk-python).
Thank you for helping us keep our projects secure for everyone.