Skip to main content
Glama

Aiven MCP Server

Apache 2.0
  • Apple
SECURITY.md1.45 kB
# Security Policy ## Supported Versions We release patches for security vulnerabilities. Which versions are eligible receiving such patches depend on the CVSS v3.0 Rating: | CVSS v3.0 | Supported Versions | | --------- | ----------------------------------------- | | 4.0-10.0 | Most recent release | ## Reporting a Vulnerability Please report (suspected) security vulnerabilities to our **[bug bounty program](https://bugcrowd.com/aiven-mbb-og)**. You will receive a response from us within 2 working days. If the issue is confirmed, we will release a patch as soon as possible depending on impact and complexity. ## Qualifying Vulnerabilities Any reproducible vulnerability that has a severe effect on the security or privacy of our users is likely to be in scope for the program. We generally **aren't** interested in the following issues: * Social engineering (e.g. phishing, vishing, smishing) attacks * Brute force, DoS, text injection * Missing best practices such as HTTP security headers (CSP, X-XSS, etc.), email (SPF/DKIM/DMARC records), SSL/TLS configuration. * Software version disclosure / Banner identification issues / Descriptive error messages or headers (e.g. stack traces, application or server errors). * Clickjacking on pages with no sensitive actions * Theoretical vulnerabilities where you can't demonstrate a significant security impact with a proof of concept.

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/mikeysrecipes/mcp-aiven'

If you have feedback or need assistance with the MCP directory API, please join our Discord server