Skip to main content
Glama

doc-ops-mcp

by Tele-AI
SECURITY.md3.75 kB
# Security Policy ## Supported Versions We release patches for security vulnerabilities. Which versions are eligible receiving such patches depend on the CVSS v3.0 Rating: | Version | Supported | | ------- | ------------------ | | 1.0.x | :white_check_mark: | | < 1.0 | :x: | ## Reporting a Vulnerability Please report vulnerabilities by emailing [reahtuoo310109@gmail.com](mailto:reahtuoo310109@gmail.com). Please include: - Description of the vulnerability - Steps to reproduce the issue - Possible impact - Suggested fix (if any) We will acknowledge receipt within 24 hours and provide updates on remediation progress. ## Security Measures ### Input Validation - All file paths are validated and sanitized - Document inputs are processed in isolated environments - User inputs are escaped and validated - File type restrictions are enforced ### File Processing Security - Temporary files are created in secure directories - All temporary files are cleaned up after processing - File size limits are enforced to prevent DoS attacks - Malicious file detection and rejection ### External Dependencies - Regular security updates for all dependencies - Vulnerability scanning using automated tools - Minimal dependency footprint to reduce attack surface - Security-focused dependency selection ### Process Isolation - LibreOffice processes run with restricted permissions - Browser instances are sandboxed - Command execution is parameterized to prevent injection - Network access is restricted for processing operations ### Data Protection - No data is sent to external servers - All processing happens locally - Sensitive data is not logged - Configuration files are protected with appropriate permissions ## Security Best Practices ### For Users - Keep the software updated to the latest version - Use strong file permissions for sensitive documents - Regularly audit the documents being processed - Monitor system resources during processing ### For Developers - Run security scans before commits - Follow secure coding practices - Validate all inputs and outputs - Use parameterized queries for any database operations ## Vulnerability Disclosure Timeline 1. **Day 0**: Vulnerability reported 2. **Day 1**: Acknowledgment sent to reporter 3. **Day 3**: Initial assessment completed 4. **Day 7**: Fix developed and tested 5. **Day 14**: Security update released 6. **Day 30**: Public disclosure (if applicable) ## Security Contacts - **Security Email**: [reahtuoo310109@gmail.com](mailto:reahtuoo310109@gmail.com) - **GitHub Security Issues**: Use GitHub's private vulnerability reporting feature - **Emergency Contact**: Use security email with "URGENT" in subject line ## Security Scanning We use the following security scanning tools: - **npm audit**: Regular dependency vulnerability scanning - **CodeQL**: Static analysis for security vulnerabilities - **Dependabot**: Automated dependency updates - **Trivy**: Container and file system scanning ## Security Headers and Configuration When deploying this MCP server: - Ensure proper file system permissions - Use principle of least privilege - Configure appropriate resource limits - Monitor system logs for suspicious activity - Implement network segmentation if applicable ## Incident Response In case of a security incident: 1. Immediately assess the impact 2. Isolate affected systems if necessary 3. Document the incident 4. Apply patches or workarounds 5. Notify affected users if data exposure occurred 6. Conduct post-incident review ## Security Updates Security updates will be: - Released as patch versions (1.0.x) - Announced via GitHub releases - Documented in CHANGELOG.md - Backported to supported versions when feasible

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Tele-AI/doc-ops-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server