| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in GAM MCP Server, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, send a detailed report to: [email protected]
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 30 days (depending on severity)
- Acknowledgment of your report
- Assessment of the vulnerability
- Development and testing of a fix
- Coordinated disclosure (we'll credit you unless you prefer anonymity)
- Never commit
credentials.jsonor service account keys to version control - Use environment variables for sensitive configuration
- Rotate authentication tokens periodically
- Always use authentication tokens in production (
GAM_MCP_AUTH_TOKEN) - Use HTTPS for remote deployments
- Run the Docker container as non-root (default configuration)
- Restrict network access to the MCP server endpoint
- Use service accounts with minimal required permissions
- Regularly audit service account access
- Revoke unused service account keys
This project implements several security measures:
- Bearer Token Authentication: All tool calls require valid authentication
- Constant-Time Comparison: Prevents timing attacks on token validation
- Parameterized Queries: All GAM API queries use bind variables to prevent injection
- Non-Root Docker: Container runs as unprivileged user
- Audit Logging: Authentication attempts are logged for monitoring
We thank the security researchers who help keep this project secure.