We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/bx33661/Wireshark-MCP'
If you have feedback or need assistance with the MCP directory API, please join our Discord server
SECURITY.md•1.3 KiB
# Security Policy
## Supported Versions
| Version | Supported |
| ------- | ------------------ |
| 0.4.x | :white_check_mark: |
| < 0.4 | :x: |
## Reporting a Vulnerability
**Please do not report security vulnerabilities through public GitHub issues.**
If you discover a security vulnerability, please report it by emailing the maintainer directly or using [GitHub's private vulnerability reporting](https://github.com/bx33661/Wireshark-MCP/security/advisories/new).
Please include:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Any suggested fixes (optional)
You can expect a response within **72 hours**. We will work with you to understand and address the issue before any public disclosure.
## Security Considerations
Wireshark MCP executes `tshark` as a subprocess. Keep the following in mind:
- **File paths**: The server accepts pcap file paths from the MCP client. Ensure your MCP client is trusted.
- **Credential extraction**: `wireshark_extract_credentials` scans for plaintext credentials in captures. Handle results with care.
- **Live capture**: `wireshark_capture` requires appropriate system permissions (`wireshark` group or root).
- **Threat intelligence**: `wireshark_check_threats` makes outbound requests to the URLhaus API.