| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
This repository implements the following security measures:
- All user inputs are validated and sanitized using the
src/utils/security/sanitization.pymodule - Command injection prevention through input whitelisting
- Target validation for IP addresses, hostnames, and URLs
- API key-based authentication for MCP servers
- JWT token support for session management
- Rate limiting to prevent abuse
- Non-privileged Docker containers
- Network isolation using bridge networking
- Resource limits to prevent DoS
- Automated dependency vulnerability scanning via GitHub Actions
- Weekly security scans scheduled
- SARIF output integration with GitHub Security tab
We take security vulnerabilities seriously. If you discover a vulnerability, please follow these steps:
- Do NOT open a public issue
- Email security details to: [security@example.com] (replace with actual email)
- Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Status Update: Every 7 days until resolved
- Resolution: Critical vulnerabilities within 30 days
- We follow responsible disclosure
- We request 90 days to fix vulnerabilities before public disclosure
- We will credit researchers who report vulnerabilities (unless anonymity is requested)
When using this tool:
- Never run as root on production systems
- Keep API keys secret - use environment variables
- Limit network exposure - bind MCP servers to localhost only
- Regular updates - keep dependencies updated
- Audit logs - monitor for suspicious activity
- Authorization - only authorized users should have access
# Required for production
MCP_SECRET_KEY=<your-secret-key-here>
RATE_LIMIT_REQUESTS=100
RATE_LIMIT_WINDOW_HOURS=1
MCP_SESSION_LIMIT=10The docker-compose.yml has been secured with:
- Network isolation (bridge mode)
- Resource limits
- Non-privileged containers
- Localhost-only port binding
This is a penetration testing tool. Be aware of:
- Legal Compliance: Ensure you have authorization to test targets
- Network Traffic: The tool generates network traffic that may trigger IDS/IPS
- Container Isolation: While secured, containers are not impenetrable
- Data Handling: Scan results may contain sensitive information
| Date | Auditor | Scope | Status |
|---|---|---|---|
| 2025-06-13 | Internal | Code Review | Completed |
For security concerns:
- Security Team: [security@example.com]
- GitHub Security: Use the "Report a vulnerability" feature