Skip to main content
Glama

ZAP MCP Server

by LisBerndt
SECURITY.md4.61 kB
# Security Policy ## 🔒 Supported Versions We actively maintain and provide security updates for the following versions: | Version | Supported | | ------- | ------------------ | | 1.0.x | :white_check_mark: | | < 1.0 | :x: | ## 🚨 Reporting a Vulnerability We take security vulnerabilities seriously. If you discover a security vulnerability, please follow these steps: ### 1. **DO NOT** create a public issue Security vulnerabilities should be reported privately to prevent exploitation. ### 2. **Email us directly** Send an email to: `security@yourdomain.com` (replace with your actual email) Include the following information: - Description of the vulnerability - Steps to reproduce - Potential impact - Suggested fix (if any) - Your contact information ### 3. **What to expect** - **Response time**: We aim to respond within 48 hours - **Acknowledgment**: You'll receive confirmation that we received your report - **Updates**: We'll keep you informed of our progress - **Resolution**: We'll work with you to resolve the issue ### 4. **Disclosure timeline** - **Initial response**: Within 48 hours - **Status update**: Within 1 week - **Resolution**: Within 30 days (depending on complexity) - **Public disclosure**: After fix is released and deployed ## 🛡️ Security Best Practices ### For Users 1. **Keep ZAP updated** - Always use the latest version of OWASP ZAP - Update your Java runtime regularly 2. **Secure your environment** - Use strong API keys if enabled - Limit network access to ZAP instances - Run ZAP in isolated environments when possible 3. **Monitor your scans** - Review scan results regularly - Set up alerts for critical vulnerabilities - Keep scan data secure ### For Developers 1. **Code security** - Follow secure coding practices - Validate all inputs - Use parameterized queries - Implement proper error handling 2. **Dependencies** - Keep dependencies updated - Use dependency scanning tools - Review third-party code 3. **Testing** - Include security tests in your CI/CD - Perform regular security audits - Test with real-world scenarios ## 🔍 Security Features ### Built-in Protections - **API Key Protection**: Optional API key authentication - **Input Validation**: All inputs are validated and sanitized - **Error Handling**: Secure error messages without information disclosure - **Session Management**: Proper session handling and cleanup - **Network Security**: Configurable network access controls ### Container Security - **Non-root User**: ZAP runs as non-root user in containers - **Minimal Attack Surface**: Only necessary ports exposed - **Regular Updates**: Base images updated regularly - **Security Scanning**: Container images scanned for vulnerabilities ## 📋 Security Checklist Before deploying ZAP MCP Server: - [ ] ZAP is updated to latest version - [ ] Java runtime is updated - [ ] API keys are configured (if needed) - [ ] Network access is properly restricted - [ ] Log files are secured - [ ] Backup procedures are in place - [ ] Monitoring is configured - [ ] Security policies are defined ## 🚫 Known Limitations ### Current Limitations 1. **API Key**: Disabled by default in Docker (can be enabled) 2. **Network Access**: ZAP API accessible on all interfaces by default 3. **Session Storage**: Sessions stored locally (consider external storage for production) 4. **Logging**: Debug logs may contain sensitive information ### Mitigation Strategies 1. **Enable API Key**: Set `ZAP_APIKEY` environment variable 2. **Restrict Network**: Use firewall rules or Docker networks 3. **Secure Storage**: Use encrypted volumes for session storage 4. **Log Management**: Configure log rotation and secure storage ## 🔄 Security Updates ### How we handle security updates: 1. **Critical vulnerabilities**: Immediate patch release 2. **High severity**: Patch within 1 week 3. **Medium severity**: Patch within 1 month 4. **Low severity**: Included in next regular release ### Update notifications: - GitHub security advisories - Release notes - Email notifications (for critical issues) ## 📞 Contact For security-related questions or concerns: - **Email**: `security@yourdomain.com` - **GitHub**: Create a private security issue - **Discord**: Use the security channel (if available) ## 🙏 Acknowledgments We appreciate security researchers who help us improve the security of ZAP MCP Server. Responsible disclosure helps us protect all users. --- **Last updated**: January 2025 **Next review**: July 2025

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/LisBerndt/zap-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server