Skip to main content
Glama

DollhouseMCP

by DollhouseMCP
SECURITY_MEASURES.mdโ€ข6.8 kB
# DollhouseMCP Security Measures ## Overview DollhouseMCP implements comprehensive security measures to protect users, their content, and the broader ecosystem. This document outlines the security features and protections currently in place. ## Core Security Principles 1. **Defense in Depth** - Multiple layers of security controls 2. **Least Privilege** - Minimal permissions required for operations 3. **Secure by Default** - Security features enabled out of the box 4. **Transparency** - Clear communication about security practices ## Security Features ### ๐Ÿ” Token Protection - **Secure Token Handling** - Tokens are never stored persistently - Automatic redaction in all logs and error messages - Memory protection for sensitive credentials - Validated token formats before use - **API Authentication** - Support for multiple GitHub token types - Automatic scope validation - Rate limiting on token operations - Secure token lifecycle management ### ๐Ÿ›ก๏ธ Content Security - **Input Validation Pipeline** - Multi-stage validation process - Schema validation with strict typing - Size limits enforced (100KB maximum) - Character encoding verification - Unicode normalization for security - **Malicious Content Detection** - Pattern-based threat detection - Secret scanning in user content - External resource validation - Automated security analysis - **Memory Injection Protection (Issue #1269)** - 30+ injection pattern detections - Unicode attack prevention (bidirectional text, homographs) - YAML bomb protection with circular reference detection - Multi-layer validation pipeline - Automatic content sanitization - **URL Security** - Comprehensive URL validation - Protection against local network access - Whitelist of allowed protocols - Domain reputation checking ### ๐Ÿšฆ Rate Limiting - **API Protection** - Per-user rate limits - Endpoint-specific limits - Token bucket algorithm - Graceful degradation - **Abuse Prevention** - Submission rate limits - Failed attempt tracking - Temporary blocking for violations - Reputation-based adjustments ### ๐Ÿ“Š Security Monitoring - **Audit Logging** - Security event tracking - Anomaly detection - Real-time alerting - Forensic capabilities - **Threat Detection** - Pattern recognition - Behavioral analysis - Community reporting - Automated responses - **Security Telemetry (New)** - Real-time attack metrics tracking - Attack vector aggregation and analysis - Hourly attack distribution monitoring - Top attack patterns identification - Export capabilities for external SIEM integration - 24-hour rolling window metrics - Severity-based categorization ### ๐Ÿ”„ Update Security - **Secure Update Process** - Signature verification - Integrity checking - Rollback capabilities - Version validation - **Dependency Management** - Regular security updates - Vulnerability scanning - License compliance - Supply chain security ## Content Sharing Security ### Submission Pipeline 1. Client-side validation 2. Rate limit checking 3. Server-side validation 4. Security gate analysis 5. Risk scoring 6. Quarantine if needed 7. Final approval/rejection ### Risk Assessment Factors - User reputation score - Content complexity analysis - External resource count - Pattern matching results - Historical behavior ## API Security ### Protected Endpoints All API endpoints implement: - Input sanitization - Output encoding - Error handling without information disclosure - Timeout protection - Request size limits ### External API Integration - Secure credential management - API response validation - Timeout enforcement - Error isolation ## Best Practices for Users ### Protecting Your Tokens 1. Never share your GitHub token 2. Use tokens with minimal required scopes 3. Rotate tokens regularly 4. Monitor token usage ### Secure Content Creation 1. Avoid including secrets in personas 2. Validate external resources 3. Use official marketplace for sharing 4. Report suspicious content ## Security Compliance ### Standards and Frameworks - OWASP Top 10 considerations - Security by design principles - Regular security assessments - Continuous improvement process ### Data Protection - No persistent storage of credentials - Minimal data collection - User control over shared content - Clear data handling policies ## Incident Response ### Response Process 1. **Detection** - Automated and community reporting 2. **Assessment** - Severity and impact analysis 3. **Mitigation** - Immediate protective actions 4. **Resolution** - Full fix deployment 5. **Communication** - User notification if needed ### Response Commitments - Critical issues: Response within 4 hours - High severity: Response within 24 hours - Medium severity: Response within 72 hours - Security advisories published promptly ## Responsible Disclosure We welcome security research and responsible disclosure: - **Contact**: security@dollhousemcp.com (coming soon) - **GPG Key**: [Public key available] - **Response Time**: Within 48 hours - **Bug Bounty**: Program details coming soon ### Disclosure Process 1. Report vulnerability privately 2. Receive acknowledgment within 48 hours 3. Collaborate on fix timeline 4. Coordinated disclosure 5. Credit in security advisory ## Version Security ### Supported Versions | Version | Security Support | |---------|-----------------| | 1.2.x | โœ… Active | | 1.1.x | โš ๏ธ Critical only | | 1.0.x | โŒ End of life | ### Security Update Policy - Critical patches for current and previous minor version - Regular updates for current version only - Clear upgrade paths provided - Breaking changes avoided in security updates ## Continuous Improvement ### Regular Activities - Weekly dependency updates - Monthly security reviews - Quarterly penetration testing - Annual security audit ### Community Involvement - Open security discussions - Public security roadmap - Community security champions - Educational resources ## Getting Help ### Security Questions - Documentation: `/docs/security/` - Community: Discord security channel - Email: support@dollhousemcp.com ### Reporting Issues - Security issues: Use responsible disclosure - Bugs: GitHub issues - Questions: Community forums ## Conclusion Security is a top priority for DollhouseMCP. We continuously improve our security posture through proactive measures, community engagement, and rapid response to issues. By using DollhouseMCP, you benefit from these comprehensive security measures designed to protect you and your content. For more technical details about our security architecture, see [SECURITY_ARCHITECTURE.md](./SECURITY_ARCHITECTURE.md). --- *Last updated: July 2025* *Version: 1.0*

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/DollhouseMCP/DollhouseMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server