Skip to main content
Glama
SECURITY.md3.42 kB
# Security Policy ## Supported Versions Security fixes are applied to actively maintained releases of mcp-ssh-orchestrator. Older releases receive fixes only when the backport effort is low and the issue is high severity. | Version | Status | |---------|--------| | `main` branch | Actively supported | | `v1.0.x` | Supported (critical + high fixes) | | Older releases | Best effort (consider upgrading) | If you are running an older release and cannot upgrade, please highlight that in your report so we can discuss options. ## Reporting a Vulnerability Please follow the steps below to report a potential vulnerability: 1. **Do not open a public GitHub issue or discussion.** 2. Submit a private report using one of the following channels: - **GitHub Security Advisories:** <https://github.com/samerfarida/mcp-ssh-orchestrator/security/advisories/new> - **Email:** `samer.farida@yahoo.com` 3. Include as much detail as possible: - Proof-of-concept or reproduction steps - Affected versions (commit SHA or release tag) - Impact assessment and suggested mitigations, if known - Preferred contact information and availability 4. If you require encryption, use our OpenPGP key (`openpgp4fpr:6775BF3F439A2A8A198DE10D4FC5342A979BD358`) or mention it and we can send the key via email. ## What Happens Next - **Acknowledgement:** We aim to acknowledge receipt within **2 business days**. - **Initial assessment:** We will triage and respond with initial findings or questions within **5 business days**. - **Remediation plan:** For confirmed vulnerabilities, we will coordinate on a fix, testing, and target release timeline. We may request additional information to reproduce or validate the issue. - **Coordinated disclosure:** We prefer to coordinate disclosure so end users can patch before details are public. We will agree on a disclosure window (typically 30–90 days depending on severity) and keep you updated on progress. If you believe a vulnerability is being actively exploited or needs immediate attention, please mark your report as **URGENT** and include a reachable contact method. ## Preferred Languages We are comfortable receiving reports in **English**. If English is not convenient, please still contact us and we will work with you using translation tools. ## Safe Harbor We value legitimate security research. When you follow this policy and report issues responsibly, we will not pursue legal action or DMCA claims against you. Please: - Avoid privacy violations, service degradation, or destruction of data - Respect rate limits and always obtain consent before testing on systems you do not own ## Security Guidance for Deployers To keep your deployment secure, we recommend the following controls: - Use Ed25519 or 4096-bit RSA keys for SSH authentication - Keep `require_known_host: true` (enforced by default) - Configure network allowlists via `network.allow_cidrs` - Maintain a deny-by-default policy - Mount configuration, keys, and secrets as read-only volumes (`:ro`) A fuller discussion of the orchestration controls, threat model, and audit pipeline is available in our wiki: - [Security Model](https://github.com/samerfarida/mcp-ssh-orchestrator/wiki/05-Security-Model) - [Observability & Audit](https://github.com/samerfarida/mcp-ssh-orchestrator/wiki/11-Observability-Audit) Thank you for helping keep mcp-ssh-orchestrator and its users safe.

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/samerfarida/mcp-ssh-orchestrator'

If you have feedback or need assistance with the MCP directory API, please join our Discord server