We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/LeadMagic/smartlead-mcp-server'
If you have feedback or need assistance with the MCP directory API, please join our Discord server
SECURITY.md•3.52 KiB
# Security Policy
## Supported Versions
We actively support the following versions of SmartLead MCP Server with security updates:
| Version | Supported |
| ------- | ------------------ |
| 1.0.x | :white_check_mark: |
## Reporting a Vulnerability
We take the security of SmartLead MCP Server seriously. If you discover a security vulnerability, please follow these steps:
### 1. Do Not Create Public Issues
Please **do not** create public GitHub issues for security vulnerabilities. This helps protect users who haven't yet updated to a patched version.
### 2. Report Privately
Send your security report to: **security@leadmagic.io**
Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes or mitigations
### 3. Response Timeline
- **Initial Response**: Within 24 hours
- **Vulnerability Assessment**: Within 72 hours
- **Fix Development**: Depends on severity (1-14 days)
- **Release**: As soon as fix is ready and tested
### 4. Disclosure Policy
- We will acknowledge receipt of your report within 24 hours
- We will provide regular updates on our progress
- We will notify you when the vulnerability is fixed
- We will publicly disclose the vulnerability after a fix is released
- We will credit you for the discovery (unless you prefer to remain anonymous)
## Security Best Practices
### For Users
1. **API Key Security**
- Never commit API keys to version control
- Use environment variables or secure secret management
- Rotate API keys regularly
- Limit API key permissions to minimum required
2. **Environment Security**
- Keep dependencies updated
- Use the latest version of SmartLead MCP Server
- Monitor for security advisories
- Use secure network connections
3. **Configuration Security**
- Review MCP client configurations
- Limit server access to trusted clients only
- Use proper file permissions for configuration files
- Regularly audit server logs
### For Developers
1. **Code Security**
- Follow secure coding practices
- Validate all inputs
- Use parameterized queries
- Implement proper error handling
2. **Dependency Security**
- Regularly update dependencies
- Use `npm audit` to check for vulnerabilities
- Pin dependency versions in production
- Review dependency licenses and security policies
3. **API Security**
- Implement rate limiting
- Use HTTPS for all API communications
- Validate API responses
- Handle authentication errors properly
## Known Security Considerations
### API Key Exposure
- API keys are passed as environment variables
- Ensure proper process isolation in shared environments
- Consider using secret management systems in production
### Network Security
- All API communications use HTTPS
- No sensitive data is logged by default
- Consider network-level security controls
### Input Validation
- All inputs are validated using Zod schemas
- SQL injection is not applicable (REST API client)
- XSS protection through proper output encoding
## Security Updates
Security updates will be released as patch versions and announced through:
- GitHub Security Advisories
- Release notes
- Email notifications to maintainers
## Contact
For security-related questions or concerns:
- **Email**: support@leadmagic.io
- **GitHub**: Create a private security advisory
- **Website**: https://leadmagic.io
## Acknowledgments
We appreciate the security research community and will acknowledge researchers who responsibly disclose vulnerabilities to us.