We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
Version | Supported |
---|---|
1.x.x | ✅ |
< 1.0 | ❌ |
Please report (suspected) security vulnerabilities to [email protected]. You will receive a response from us within 48 hours. If the issue is confirmed, we will release a patch as soon as possible depending on complexity but historically within a few days.
- Use dedicated database users with minimal required permissions
- Never use sa credentials or administrative accounts in production
- Restrict database access to only necessary operations (SELECT, INSERT, UPDATE, DELETE)
- Enable SSL/TLS encryption for database connections when possible
- Use connection pooling with appropriate limits
- Never commit credentials to version control
- Use environment variables for all sensitive configuration
- Rotate credentials regularly in production environments
- Use strong passwords with appropriate complexity requirements
- Restrict network access to database servers
- Use firewalls to limit database port access
- Consider VPN or private networks for database connections
- Monitor connection attempts and failed authentications
- Validate all input parameters to prevent SQL injection
- Use parameterized queries for all database operations
- Implement rate limiting for query execution
- Log all database operations for audit purposes
- Regular security audits of database access patterns
- Use read-only connections when possible
- Implement query whitelisting for production environments
- Monitor and alert on suspicious database activity
- Regular backup and recovery testing
- Keep dependencies updated and scan for vulnerabilities
-- Create a dedicated login for MCP server
CREATE LOGIN mcp_user WITH PASSWORD = 'StrongPassword123!';
-- Create user in target database
USE your_database;
CREATE USER mcp_user FOR LOGIN mcp_user;
-- Grant minimal required permissions
GRANT SELECT ON SCHEMA::dbo TO mcp_user;
-- Only grant additional permissions if absolutely necessary
-- GRANT INSERT ON SCHEMA::dbo TO mcp_user;
-- GRANT UPDATE ON SCHEMA::dbo TO mcp_user;
-- GRANT DELETE ON SCHEMA::dbo TO mcp_user;
# Use strong, unique passwords
DB_PASSWORD=ComplexPassword123!@#
# Enable encryption when possible
DB_ENCRYPT=true
DB_TRUST_SERVER_CERTIFICATE=false
# Set appropriate timeouts
DB_CONNECTION_TIMEOUT=30000
DB_REQUEST_TIMEOUT=30000
For security-related questions or concerns, please contact:
- Email: [email protected]
- Security Advisory: Check GitHub Security Advisories