Skip to main content
Glama

MCPy

by magi8101
SECURITY.md3.71 kB
# Security Policy ## Supported Versions Use this section to inform users about which versions of MCPy are currently supported with security updates. | Version | Supported | | ------- | ------------------ | | 1.0.x | :white_check_mark: | | 0.9.x | :white_check_mark: | | 0.8.x | :white_check_mark: | | < 0.8 | :x: | ## Reporting a Vulnerability We take the security of MCPy seriously. If you believe you've found a security vulnerability, please follow these steps: ### Preferred Method 1. **Do not** disclose the vulnerability publicly. 2. Email your findings to [mail](mailto:sharmamagi0@gmail.com). If possible, encrypt your message using our PGP key (available below). 3. Include detailed information about the vulnerability: - Type of vulnerability - Path or component affected - Steps to reproduce - Potential impact - Any potential remediation suggestions ### What to Expect - We will acknowledge receipt of your report within 48 hours. - We will provide a more detailed response within 7 days, indicating next steps in handling your report. - We will keep you informed about our progress towards addressing the vulnerability. - After the vulnerability has been fixed, we may publicly acknowledge your responsible disclosure (if you wish). ## Security Measures MCPy implements several security measures to protect users and server environments: ### Network Security - All network traffic is encrypted using industry-standard protocols - DDoS protection mechanisms are built into the networking stack - Configurable rate limiting for client connections - IP-based access controls ### Authentication - Password hashing using bcrypt with appropriate salt mechanisms - Session management with regular token rotation - Optional two-factor authentication support - Configurable password policies ### Data Security - World data is verified for integrity upon loading - Automatic backup systems prevent data loss - Data validation for all user inputs - Protection against SQL injection through prepared statements ### Plugin Security - Sandboxed execution environment for plugins - Permission-based access control system - Resource usage limitations - Signature verification for official plugins ## Best Practices for Server Administrators 1. **Keep MCPy Updated**: Always use the latest version of MCPy to benefit from security updates. 2. **User Management**: - Use strong passwords for admin accounts - Regularly review user permissions - Remove inactive users 3. **Network Configuration**: - Use a firewall to restrict access to server ports - Consider using a reverse proxy for additional protection - Implement connection throttling 4. **Backups**: - Enable regular automatic backups - Store backups in a separate location - Test backup restoration regularly 5. **Plugin Management**: - Only install plugins from trusted sources - Review plugin code before installation when possible - Keep plugins updated 6. **Monitoring**: - Enable logging and regularly review logs - Set up alerts for suspicious activity - Monitor system resource usage ## Security Features in Development - Enhanced cryptographic verification for client connections - Improved plugin sandboxing and security controls - Advanced server fingerprinting to detect tampering - Automated security scanning for custom plugins - Integration with external authentication providers ## External Security Resources - [OWASP Top Ten](https://owasp.org/www-project-top-ten/) - [Minecraft Server Security Guide](https://example.com/minecraft-security) - [Python Security Best Practices](https://python-security.readthedocs.io/)

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/magi8101/Mcpy'

If you have feedback or need assistance with the MCP directory API, please join our Discord server