Skip to main content
Glama
SECURITY.md7.95 kB
# Security Policy ## Supported Versions We actively support the following versions of Event Horizon MCP Server with security updates: | Version | Supported | | ------- | ------------------ | | 1.0.x | :white_check_mark: | | < 1.0 | :x: | ## Reporting a Vulnerability We take the security of Event Horizon MCP Server seriously. If you discover a security vulnerability, please report it responsibly. ### How to Report **DO NOT** open a public GitHub issue for security vulnerabilities. Instead, please email security concerns to: **themanaspandey@gmail.com** Include the following information in your report: - **Type of issue** (e.g., buffer overflow, SQL injection, cross-site scripting, etc.) - **Full paths** of source file(s) related to the manifestation of the issue - **Location** of the affected source code (tag/branch/commit or direct URL) - **Step-by-step instructions** to reproduce the issue - **Proof-of-concept or exploit code** (if possible) - **Impact** of the issue, including how an attacker might exploit the issue ### Response Timeline - **Acknowledgment**: We will acknowledge receipt of your vulnerability report within 48 hours - **Initial Assessment**: We will provide an initial assessment within 7 days - **Progress Updates**: We will send progress updates at least every 7 days - **Resolution**: We aim to resolve critical vulnerabilities within 90 days ### Disclosure Policy - We will coordinate disclosure of the vulnerability with you - We will credit you in the security advisory (unless you prefer to remain anonymous) - We will publish a security advisory after the vulnerability is patched - We request that you do not publicly disclose the issue until we have addressed it ## Security Considerations ### MCP Server Security Event Horizon MCP Server operates as a bridge between LLM applications and computational resources. Key security areas: #### Input Validation - **Problem Statements**: All user-provided problem statements are treated as untrusted input - **Consistency Checks**: Validation of consistency check descriptions and weights - **Solution Content**: Sanitization of solution content to prevent injection attacks - **Scoring Data**: Validation of score values and ranges (0.0-1.0) #### Resource Management - **Memory Limits**: Protection against excessive memory usage from large populations - **CPU Limits**: Prevention of infinite loops or excessive computation - **Generation Limits**: Built-in safeguards against runaway evolution processes - **Solution Storage**: Secure handling of potentially sensitive solution data #### Protocol Security - **MCP Compliance**: Adherence to Model Context Protocol security guidelines - **Transport Security**: Secure handling of stdio and HTTP transports - **Error Handling**: Prevention of information leakage through error messages - **Authentication**: Proper handling of client authentication (when applicable) ### Deployment Security #### Local Deployment (Claude Desktop) - **Filesystem Access**: Limited to designated directories only - **Process Isolation**: Server runs in isolated process context - **Resource Monitoring**: Built-in monitoring for resource usage - **Logging Security**: Secure logging without exposing sensitive data #### Smithery Cloud Deployment - **Container Security**: Hardened Docker container with minimal attack surface - **Network Security**: Proper HTTP security headers and CORS configuration - **Environment Variables**: Secure handling of configuration data - **Health Checks**: Secure health check endpoints without information disclosure #### HTTP Server Security - **Input Sanitization**: All HTTP requests are validated and sanitized - **CORS Configuration**: Appropriate Cross-Origin Resource Sharing settings - **Rate Limiting**: Protection against abuse and DoS attacks - **Error Responses**: Standardized error responses without sensitive information ### Evolutionary Algorithm Security #### Data Integrity - **Solution Tracking**: Secure tracking of solution lineage and parent relationships - **Score Integrity**: Prevention of score manipulation or tampering - **Generation Consistency**: Maintaining consistent generation state - **Convergence Validation**: Proper validation of convergence criteria #### Algorithmic Security - **Deterministic Behavior**: Ensuring reproducible results when required - **Random Number Generation**: Use of cryptographically secure randomness where appropriate - **Crossover Security**: Secure handling of solution combination processes - **Mutation Safety**: Safe application of solution mutations ### Third-Party Dependencies We regularly monitor and update our dependencies for security vulnerabilities: - **@modelcontextprotocol/sdk**: Core MCP functionality - **chalk**: Terminal output styling - **yargs**: Command-line argument parsing - **TypeScript**: Compilation and type safety Automated dependency scanning is performed through: - GitHub Dependabot alerts - npm audit checks - Regular dependency updates ### Common Vulnerabilities #### Known Attack Vectors 1. **Malicious Problem Statements** - Large input strings causing memory exhaustion - Strings containing script injection attempts - Crafted inputs attempting to break parsing logic 2. **Algorithm Manipulation** - Attempts to manipulate scoring mechanisms - Invalid generation state modifications - Malformed consistency check definitions 3. **Resource Exhaustion** - Extremely large population sizes - Excessive generation counts - Complex consistency checks causing CPU exhaustion 4. **Protocol Abuse** - Malformed MCP requests - Rapid-fire request flooding - Invalid tool parameter combinations #### Mitigations - **Input validation** at all entry points - **Resource limits** enforced at runtime - **Rate limiting** for HTTP endpoints - **Graceful error handling** with secure error messages - **Logging and monitoring** for suspicious activity - **Container isolation** for Smithery deployments ### Best Practices for Users #### Secure Deployment - Keep Event Horizon MCP Server updated to the latest version - Monitor resource usage when running large evolutionary processes - Use appropriate network security when deploying HTTP server - Regularly review and rotate any authentication credentials #### Safe Usage - Validate problem statements and consistency checks before use - Monitor evolution processes for unexpected behavior - Use reasonable population sizes and generation limits - Report any suspicious behavior or unexpected results #### Configuration Security - Secure storage of Smithery deployment configurations - Proper handling of environment variables - Regular backup of important evolution results - Secure logging configuration ## Security Updates Security updates will be distributed through: - **GitHub Releases**: Tagged releases with security patches - **Smithery Registry**: Automatic updates for Smithery deployments - **Security Advisories**: Published on GitHub Security tab - **Notification**: Email notification to vulnerability reporters Subscribe to repository releases and security advisories to stay informed about security updates. ## Contact For general security questions about Event Horizon MCP Server: - **Email**: themanaspandey@gmail.com - **GitHub Issues**: [General questions only](https://github.com/manasp21/EventHorizon/issues) - **Documentation**: [MCP Security Guidelines](https://modelcontextprotocol.io/) **Remember**: Always use the private email for actual vulnerability reports, never public channels. ## Acknowledgments We appreciate the security research community's efforts to improve the security of Event Horizon MCP Server. Responsible disclosure helps us protect all users of the system. --- *This security policy is based on industry best practices and is regularly updated to reflect new threats and mitigations.*

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/manasp21/EventHorizon'

If you have feedback or need assistance with the MCP directory API, please join our Discord server