Skip to main content
Glama

authentik-mcp

by cdmx-in
SECURITY.md3.1 kB
# Security Policy ## Supported Versions Currently, the following versions are supported with security updates: | Version | Supported | | ------- | ------------------ | | 0.1.x | :white_check_mark: | ## Reporting a Vulnerability We take security vulnerabilities seriously. If you discover a security vulnerability, please follow these steps: ### 1. **Do NOT** create a public GitHub issue ### 2. Send a private email to the maintainers Please send details of the vulnerability to: - Email: [roney.dsilva@cdmx.in] - Subject: "Security Vulnerability in authentik-mcp" ### 3. Include the following information: - **Description**: A detailed description of the vulnerability - **Steps to Reproduce**: Clear steps showing how to exploit the vulnerability - **Impact**: What an attacker could potentially do - **Affected Components**: Which parts of the codebase are affected - **Suggested Fix**: If you have ideas for fixing it ### 4. What to expect: - **Acknowledgment**: We will acknowledge receipt of your report within 48 hours - **Investigation**: We will investigate and validate the vulnerability within 7 days - **Updates**: We will provide regular updates on our progress - **Resolution**: We aim to resolve critical vulnerabilities within 30 days ## Security Considerations for Users ### API Token Security - **Never commit API tokens** to version control - Use environment variables or secure configuration files - Rotate API tokens regularly - Use tokens with minimal required permissions ### Network Security - Always use HTTPS when connecting to Authentik - Consider using VPN or private networks for sensitive environments - Validate SSL certificates ### MCP Server Security - Run MCP servers in isolated environments when possible - Limit network access to only required ports - Use proper authentication and authorization - Monitor server logs for suspicious activity ### Configuration Security - Protect configuration files containing sensitive information - Use file permissions to restrict access (chmod 600) - Consider using encrypted configuration stores ## Known Security Considerations ### API Access - This tool provides access to Authentik APIs with the permissions of the provided token - Ensure tokens used have appropriate scope limitations - Monitor API usage for unexpected patterns ### Data Exposure - Be cautious when logging or debugging - avoid exposing sensitive data - MCP protocol communication should be secured in production environments ### Dependencies - We regularly update dependencies to address security vulnerabilities - Use `npm audit` and `uv check` to monitor for known vulnerabilities ## Security Updates Security updates will be: - Released as patch versions (e.g., 0.1.1, 0.1.2) - Announced in release notes with "Security" label - Pushed to all supported versions when possible ## Contact For security-related questions or concerns: - Email: [roney.dsilva@cdmx.in] - For non-security issues, use GitHub Issues --- **Note**: Replace placeholder email addresses with actual contact information before publishing.

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/cdmx-in/authentik-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server