Skip to main content
Glama

DollhouseMCP

by DollhouseMCP
security-audit-template.md6.43 kB
# Security Audit Report Template ## Audit Information - **Date**: [YYYY-MM-DD] - **Auditor**: [Name/Tool] - **Scope**: [Repositories/Systems Audited] - **Duration**: [Time Taken] - **Audit Type**: [Manual/Automated/Hybrid] ## Executive Summary ### Overall Security Posture - **Risk Level**: [Critical/High/Medium/Low] - **Key Findings**: [Number] total findings - **Immediate Actions Required**: [Yes/No] ### Quick Stats - Files Scanned: [Number] - Repositories Checked: [Number] - Secrets Found: [Number] - Vulnerabilities Identified: [Number] - Compliance Issues: [Number] ## 1. Secrets and Credentials Audit ### 1.1 Local Repository Scan **Scope**: All local repositories in organization directory #### Findings: - [ ] No hardcoded secrets found - [ ] Secrets properly stored in environment variables - [ ] .env files properly gitignored - [ ] No API keys in code comments - [ ] No credentials in configuration files #### Detected Secrets: | Location | Type | Severity | Status | Notes | |----------|------|----------|--------|-------| | [File:Line] | [API Key/Token/Password] | [Critical/High/Medium/Low] | [Active/Expired/Unknown] | [Details] | ### 1.2 GitHub Repository Scan **Repositories Checked**: [List] #### Public Repository Findings: - [ ] No secrets in commit history - [ ] No secrets in current codebase - [ ] No secrets in GitHub Actions logs - [ ] No secrets in pull request comments - [ ] No secrets in issues #### Repository Secrets Configuration: | Secret Name | Last Updated | Purpose | Risk Assessment | |------------|--------------|---------|-----------------| | [Name] | [Date] | [Description] | [Assessment] | ### 1.3 NPM Package Audit **Package**: [@scope/package-name] **Version**: [X.Y.Z] #### Findings: - [ ] No secrets in published package - [ ] No sensitive files included - [ ] Proper .npmignore configuration - [ ] No development files exposed ## 2. GitHub Actions Security ### 2.1 Workflow Integrity **Total Workflows**: [Number] **Last Review Date**: [Date] #### Verification Checklist: - [ ] All workflows created by authorized users - [ ] No unauthorized modifications detected - [ ] Workflow files match expected signatures - [ ] No suspicious third-party actions used - [ ] Proper secret handling in workflows #### Workflow Inventory: | Workflow Name | Created Date | Creator | Last Modified | Risk Level | |--------------|--------------|---------|---------------|------------| | [Name] | [Date] | [User] | [Date] | [Assessment] | ### 2.2 Action Permissions - [ ] Minimal permissions granted - [ ] No workflow has write access to main branch - [ ] Third-party actions pinned to specific versions - [ ] No use of deprecated actions ## 3. Repository Ownership and Access ### 3.1 Organization Verification - **Organization Name**: [Name] - **Organization ID**: [ID] - **Created Date**: [Date] - **Owner Verified**: [Yes/No] ### 3.2 Repository Access Control | Repository | Visibility | Contributors | Last Activity | Anomalies | |------------|------------|--------------|---------------|-----------| | [Name] | [Public/Private] | [Number] | [Date] | [None/Details] | ### 3.3 Suspicious Activity Detection - [ ] No unexpected contributors - [ ] No unusual commit patterns - [ ] No unauthorized repository transfers - [ ] No suspicious branch protection changes ## 4. Supply Chain Security ### 4.1 Dependency Analysis - **Total Dependencies**: [Number] - **Outdated Dependencies**: [Number] - **Vulnerable Dependencies**: [Number] #### Critical Vulnerabilities: | Package | Version | Vulnerability | Severity | Fix Available | |---------|---------|---------------|----------|---------------| | [Name] | [Version] | [CVE/Description] | [Level] | [Yes/No] | ### 4.2 GitHub Worm Detection **Known Worm Indicators Checked**: - [ ] Unexpected workflow modifications - [ ] Unknown SSH keys added - [ ] Suspicious commit messages - [ ] Unauthorized package publications - [ ] Unusual API access patterns **Detection Results**: [No indicators found / Suspicious activity detected] ## 5. Security Best Practices Assessment ### 5.1 Code Security - [ ] Input validation implemented - [ ] Output encoding in place - [ ] Secure error handling - [ ] No use of dangerous functions - [ ] Proper authentication checks ### 5.2 Infrastructure Security - [ ] Branch protection enabled - [ ] Required reviews configured - [ ] Status checks enforced - [ ] Signed commits required - [ ] Security scanning enabled ### 5.3 Compliance - [ ] GDPR compliance verified - [ ] License compliance checked - [ ] Security policy documented - [ ] Incident response plan exists - [ ] Regular security training conducted ## 6. Risk Assessment ### Risk Matrix | Risk Category | Current Level | Target Level | Gap | |--------------|---------------|--------------|-----| | Secrets Management | [1-5] | [1-5] | [Gap] | | Access Control | [1-5] | [1-5] | [Gap] | | Supply Chain | [1-5] | [1-5] | [Gap] | | Code Security | [1-5] | [1-5] | [Gap] | | Infrastructure | [1-5] | [1-5] | [Gap] | ### Overall Risk Score **Current**: [Score]/25 **Target**: [Score]/25 **Risk Trend**: [Improving/Stable/Degrading] ## 7. Recommendations ### Immediate Actions (Critical) 1. [Action item with specific steps] 2. [Action item with specific steps] ### Short-term Improvements (Within 30 days) 1. [Improvement with timeline] 2. [Improvement with timeline] ### Long-term Enhancements (Quarterly) 1. [Enhancement with expected outcome] 2. [Enhancement with expected outcome] ## 8. Remediation Tracking | Finding | Priority | Owner | Due Date | Status | |---------|----------|-------|----------|--------| | [Issue] | [P0-P3] | [Person] | [Date] | [Status] | ## 9. Compliance Certification ### Attestation - [ ] All findings have been documented - [ ] Risk assessments are accurate - [ ] Recommendations are actionable - [ ] Report has been reviewed **Auditor Signature**: ________________________ **Date**: ________________________ **Next Audit Due**: ________________________ ## Appendices ### A. Tools Used - [Tool name and version] - [Tool name and version] ### B. Scan Configuration ```yaml # Include relevant configuration ``` ### C. References - [Security standards referenced] - [Best practices guides] - [Compliance frameworks] ### D. Glossary - **Term**: Definition - **Term**: Definition --- *This template should be customized based on specific organizational needs and compliance requirements.*

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/DollhouseMCP/DollhouseMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server