We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/controlplaneio-fluxcd/flux-operator'
If you have feedback or need assistance with the MCP directory API, please join our Discord server
{
"@context": "https://openvex.dev/ns/v0.2.0",
"@id": "https://openvex.dev/docs/public/vex-f843e58a33079b9f9344d4b4e72a3dcc0ee7ad51825e087b96692dccaf21f2d8",
"author": "flux-enterprise@control-plane.io",
"role": "Enterprise Flux Maintainers",
"timestamp": "2025-09-30T12:26:04.422544+03:00",
"last_updated": "2025-10-08T12:20:00.000000+03:00",
"version": 2,
"statements": [
{
"vulnerability": {
"name": "CVE-2025-66506"
},
"timestamp": "2025-12-08T09:40:00Z",
"products": [
{
"@id": "pkg:golang/github.com/sigstore/fulcio@1.7.1"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"impact_statement": "The affected code is not executed by Flux."
},
{
"vulnerability": {
"name": "CVE-2025-66506"
},
"timestamp": "2025-12-08T09:40:00Z",
"products": [
{
"@id": "pkg:oci/source-controller"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"impact_statement": "The source-controller does not run the Fulcio server itself."
},
{
"vulnerability": {
"name": "CVE-2025-66564"
},
"timestamp": "2025-12-08T09:40:00Z",
"products": [
{
"@id": "pkg:golang/github.com/sigstore/timestamp-authority@1.2.8"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"impact_statement": "The affected code is not executed by Flux."
},
{
"vulnerability": {
"name": "CVE-2025-66564"
},
"timestamp": "2025-12-08T09:40:00Z",
"products": [
{
"@id": "pkg:oci/source-controller"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"impact_statement": "The source-controller does not run the Timestamp Authority server itself."
},
{
"vulnerability": {
"name": "CVE-2025-9230"
},
"timestamp": "2025-10-08T12:20:00.000000+03:00",
"products": [
{
"@id": "pkg:apk/alpine/libssl3@3.5.1-r0"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"impact_statement": "The vulnerable code is not executed by Flux"
},
{
"vulnerability": {
"name": "CVE-2025-9230"
},
"timestamp": "2025-10-08T12:20:00.000000+03:00",
"products": [
{
"@id": "pkg:apk/alpine/libcrypto3@3.5.1-r0"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"impact_statement": "The vulnerable code is not executed by Flux"
},
{
"vulnerability": {
"name": "CVE-2025-9231"
},
"timestamp": "2025-10-08T12:20:00.000000+03:00",
"products": [
{
"@id": "pkg:apk/alpine/libssl3@3.5.1-r0"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"impact_statement": "The vulnerable code is not executed by Flux"
},
{
"vulnerability": {
"name": "CVE-2025-9231"
},
"timestamp": "2025-10-08T12:20:00.000000+03:00",
"products": [
{
"@id": "pkg:apk/alpine/libcrypto3@3.5.1-r0"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"impact_statement": "The vulnerable code is not executed by Flux"
},
{
"vulnerability": {
"name": "CVE-2025-9232"
},
"timestamp": "2025-10-08T12:20:00.000000+03:00",
"products": [
{
"@id": "pkg:apk/alpine/libssl3@3.5.1-r0"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"impact_statement": "The vulnerable code is not executed by Flux"
},
{
"vulnerability": {
"name": "CVE-2025-9086"
},
"timestamp": "2025-10-08T12:20:00.000000+03:00",
"products": [
{
"@id": "pkg:apk/alpine/libcurl@8.14.1-r1"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"impact_statement": "The vulnerable code is not executed by Flux"
},
{
"vulnerability": {
"name": "CVE-2025-10148"
},
"timestamp": "2025-10-08T12:20:00.000000+03:00",
"products": [
{
"@id": "pkg:apk/alpine/libcurl@8.14.1-r1"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"impact_statement": "The vulnerable code is not executed by Flux"
}
]
}