We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/Arkya-AI/ember-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server
SECURITY.md•1.41 KiB
# Security Policy
## Supported Versions
| Version | Supported |
| ------- | --------- |
| 3.0.x | Yes |
| < 3.0 | No |
## Reporting a Vulnerability
Please do **not** file a public GitHub issue for security vulnerabilities.
Report security issues by emailing the maintainers at the address listed on [ember.timolabs.dev](https://ember.timolabs.dev). Include:
- A description of the vulnerability and its potential impact
- Steps to reproduce the issue
- Any suggested mitigations you have identified
You will receive a response within 72 hours. If the issue is confirmed, a patch will be released as soon as possible and you will be credited in the changelog.
## Scope
Ember MCP runs entirely locally. There is no cloud backend, no network ingress, and no authentication layer. The primary attack surface is:
- **Local file access via `source_path`:** Embers can store file paths that are read back during `ember_deep_recall`. All source paths are restricted to the user's home directory (`Path.home()`). Paths outside this boundary are silently skipped.
- **Embedding model downloads:** The `all-MiniLM-L6-v2` model is downloaded from Hugging Face on first run via `sentence-transformers`. Verify the model hash if operating in a high-trust environment.
- **Local storage at `~/.ember-v3/`:** No encryption at rest. Do not store highly sensitive secrets directly as ember content in shared-machine environments.