Skip to main content
Glama

Aligo SMS MCP Server

by hongsw
SECURITY.md1.44 kB
# Security Policy ## Security Status ✅ **All known vulnerabilities have been resolved as of 2025-07-26** ### Previous Issues (Resolved) The project previously had a security vulnerability due to the `aligoapi` package dependency, which used an outdated version of axios (0.21.4) with known vulnerabilities: 1. **Axios Cross-Site Request Forgery Vulnerability** (GHSA-wf5p-g6vw-rhxx) - RESOLVED 2. **Axios Requests Vulnerable To Possible SSRF and Credential Leakage** (GHSA-jr5f-v2jv-69x6) - RESOLVED ### Resolution We have successfully re-engineered the codebase to: - Remove the `aligoapi` dependency entirely - Implement direct API calls using the latest version of axios (^1.7.0) - Maintain full functionality while improving security ## Current Security Measures The aligo-sms-mcp-server implements the following security practices: - Uses the latest stable version of all dependencies - Regular security audits via `npm audit` - Designed for use in controlled environments with trusted input - Only accepts input from authorized MCP clients (like Claude AI) - Does not expose any public-facing endpoints - Uses authenticated API requests with secure HTTPS connections ## Reporting Security Vulnerabilities If you discover a security vulnerability, please report it by creating an issue with the "security" label. ## Verification You can verify the security status by running: ```bash npm audit ``` Last updated: 2025-07-26

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/hongsw/aligo-sms-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server