Skip to main content
Glama

MCP Tools

by taylorleese
SECURITY.md•5.46 kB
# Security Policy ## Supported Versions We release patches for security vulnerabilities for the following versions: | Version | Supported | | ------- | ------------------ | | 0.1.x | :white_check_mark: | | < 0.1.0 | :x: | ## Reporting a Vulnerability We take the security of mcp-toolz seriously. If you believe you have found a security vulnerability, please report it to us as described below. For a list of disclosed security vulnerabilities, see our [GitHub Security Advisories](https://github.com/taylorleese/mcp-toolz/security/advisories). ### How to Report **Please do NOT report security vulnerabilities through public [GitHub issues](https://github.com/taylorleese/mcp-toolz/issues).** Instead, please report them via email to: **tleese22 [at] gmail [dot] com** Alternatively, you can use GitHub's private vulnerability reporting: <https://github.com/taylorleese/mcp-toolz/security/advisories/new> You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message. ### What to Include Please include the following information in your report (if applicable): - Type of issue (e.g., injection, privilege escalation, information disclosure, etc.) - Full paths of source file(s) related to the manifestation of the issue - The location of the affected source code (tag/branch/commit or direct URL) - Any special configuration required to reproduce the issue - Step-by-step instructions to reproduce the issue - Proof-of-concept or exploit code (if possible) - Impact of the issue, including how an attacker might exploit it This information will help us triage your report more quickly. ### Response Timeline - We will acknowledge receipt of your vulnerability report within 48 hours - We will send you a more detailed response within 96 hours indicating the next steps in handling your report - We will keep you informed about the progress towards a fix and full announcement - We may ask for additional information or guidance ### Disclosure Policy - We ask that you do not publicly disclose the vulnerability until we have released a fix - We will credit you for the discovery when we announce the fix (unless you prefer to remain anonymous) - When we receive a security bug report, we will confirm the problem, determine affected versions, audit code to find similar problems, and prepare fixes for all supported versions - We will release new versions as soon as possible ### Preferred Languages We prefer all communications to be in English. ## Security Best Practices When using mcp-toolz: 1. **Protect API Keys**: Never commit API keys to version control. Use `.env` files or environment variables. The `.env.example` file provides a template. 2. **Database Security**: The SQLite database (`~/.mcp-toolz/contexts.db`) may contain sensitive conversation data, code snippets, and AI responses. Ensure appropriate file permissions (e.g., `chmod 600`). 3. **MCP Server**: When running as an MCP server, ensure your Claude Code configuration is secure and only accessible to authorized users. 4. **Updates**: Keep mcp-toolz updated to the latest version to receive security patches. Use `pip install --upgrade mcp-toolz`. 5. **Dependencies**: We actively monitor dependencies for vulnerabilities. Review security advisories before updating. 6. **Input Validation**: While mcp-toolz validates inputs, always sanitize data before storing sensitive information. ## Security Measures mcp-toolz implements the following security measures: - **Dependency Scanning**: Automated vulnerability scanning via Dependabot and GitHub's Dependency Review Action - **Code Quality**: Pre-commit hooks with security linters: - `bandit` for Python security issues - `ruff` for code quality and security patterns - `mypy` for type safety - **Static Analysis**: Strict type checking to prevent type-related bugs - **License Compliance**: Automated license verification in CI/CD - **SQL Injection Prevention**: Parameterized queries throughout the codebase (no string concatenation) - **Input Validation**: Pydantic models for strict data validation - **Least Privilege**: GitHub Actions use minimal required permissions - **Secure Defaults**: Safe configuration defaults, explicit opt-in for sensitive features ## Continuous Monitoring We continuously monitor security through: - [GitHub Dependabot alerts](https://github.com/taylorleese/mcp-toolz/security/dependabot) - [GitHub Security Advisories](https://github.com/taylorleese/mcp-toolz/security/advisories) - [Code scanning alerts](https://github.com/taylorleese/mcp-toolz/security/code-scanning) - Pre-commit security checks - [Dependency Review](https://github.com/taylorleese/mcp-toolz/security/dependabot) on all pull requests - Regular dependency updates - [OpenSSF Scorecard](https://scorecard.dev/viewer/?uri=github.com/taylorleese/mcp-toolz) monitoring ## Additional Resources - [Project Documentation](https://github.com/taylorleese/mcp-toolz#readme) - [Contributing Guidelines](https://github.com/taylorleese/mcp-toolz/blob/main/CONTRIBUTING.md) - [License](https://github.com/taylorleese/mcp-toolz/blob/main/LICENSE) ## Comments on this Policy If you have suggestions on how this process could be improved, please [submit a pull request](https://github.com/taylorleese/mcp-toolz/pulls) or [open an issue](https://github.com/taylorleese/mcp-toolz/issues).

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/taylorleese/mcp-tools'

If you have feedback or need assistance with the MCP directory API, please join our Discord server