Skip to main content
Glama

hypertool-mcp

SECURITY.md3.11 kB
# Security Policy ## Reporting Security Vulnerabilities We take the security of Hypertool MCP seriously. If you discover a security vulnerability, please report it responsibly. ### How to Report **Please do not report security vulnerabilities through public GitHub issues.** Instead, please email us at: **<support@onegrep.dev>** Include the following information: - Type of issue (e.g., buffer overflow, command injection, privilege escalation, etc.) - Full paths of source file(s) related to the manifestation of the issue - The location of the affected source code (tag/branch/commit or direct URL) - Any special configuration required to reproduce the issue - Step-by-step instructions to reproduce the issue - Proof-of-concept or exploit code (if possible) - Impact of the issue, including how an attacker might exploit it ### Response Timeline - We will acknowledge your email within 48 hours - We will provide a detailed response within 7 days indicating our next steps - We will keep you informed of progress towards fixing the issue - We may ask for additional information or guidance ### Security Best Practices When using Hypertool MCP: 1. **Authentication**: Ensure proper authentication for all underlying MCP servers 2. **Environment Variables**: Store sensitive tokens and API keys in environment variables, never in code 3. **Configuration Security**: - Protect your `.mcp.json` configuration files - Use appropriate file permissions - Never commit sensitive configuration to version control 4. **Network Security**: - Use secure transports when available - Be cautious when exposing HTTP endpoints 5. **Tool Permissions**: - Only enable tools you trust - Regularly audit enabled toolsets - Use the principle of least privilege 6. **Regular Updates**: Keep the package updated to the latest version for security patches ### Security Considerations for MCP Proxy - **Tool Isolation**: Each tool call is routed to the appropriate server without cross-contamination - **Input Validation**: All tool calls are validated before routing - **Error Handling**: Errors from underlying servers are handled gracefully without exposing sensitive information - **Connection Security**: Each underlying MCP server connection is isolated - **Configuration Validation**: All configuration files are validated against strict schemas ### Supported Versions We provide security updates for the following versions: | Version | Supported | | ------- | ------------------ | | 0.0.x | ✅ Yes | | < 0.0 | ❌ No | ### Known Security Considerations 1. **Insecure Mode**: The `--insecure` flag bypasses tool hash verification. Use only in development environments. 2. **HTTP Transport**: When using HTTP transport, ensure proper network isolation or use HTTPS proxies. 3. **Tool Permissions**: Hypertool inherits the permissions of the underlying MCP servers it connects to. ### Security Acknowledgments We appreciate the security research community and will acknowledge security researchers who responsibly disclose vulnerabilities.

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/toolprint/hypertool-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server