We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 0.9.x | ✅ |
| 0.8.x | ✅ |
| 0.7.x | ✅ |
| < 0.7 | ❌ |
We take the security of MCP Audit seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Do not open a public GitHub issue for security vulnerabilities
- Do not publicly disclose the vulnerability before it has been addressed
Preferred Method: Email security reports to [email protected]
Please include the following information:
- Description: Clear description of the vulnerability
- Impact: What could an attacker do with this vulnerability?
- Steps to Reproduce: Detailed steps to reproduce the issue
- Affected Versions: Which versions are affected?
- Proof of Concept (optional): Code or commands demonstrating the issue
- Suggested Fix (optional): If you have ideas for how to fix it
- Acknowledgment: We will acknowledge your email within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Updates: We will keep you informed of our progress
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)
MCP Audit processes session data that may contain:
- Token usage statistics - Generally not sensitive
- Tool names and parameters - May reveal implementation details
- File paths - May reveal directory structure
- Project names - May reveal internal project names
We provide built-in privacy utilities (privacy.py) for:
- Redacting secrets (API keys, tokens, passwords)
- Sanitizing file paths (removing user-specific paths)
- Filtering sensitive data before sharing session logs
Recommendation: Always use the privacy filters before sharing session data publicly.
Best Practices:
- API Keys: Never commit API keys or tokens to git
- Pricing Data: Keep
mcp-audit.tomlout of public repos if pricing is proprietary - Session Logs: Review session logs before sharing (may contain sensitive context)
- File Permissions: Ensure log files are only readable by your user
- Debug Logs: May contain full conversation history including prompts and responses
- Event Streams:
events.jsonlfiles contain complete session data - MCP Tool Names: Tool names may reveal MCP server capabilities
- ✅ Privacy filters for redacting sensitive data
- ✅ Schema versioning for safe data format evolution
- ✅ Input validation on all user-supplied data
- ✅ Type checking with mypy strict mode
- ✅ Static analysis (via GitHub CodeQL)
- ✅ Secret scanning (via GitHub secret scanning)
- 🔄 Encrypted session storage (optional)
- 🔄 Audit logging for file access
- 🔄 Configurable retention policies for sensitive data
When we receive a security vulnerability report:
- Validation: We will validate the reported vulnerability
- Patch Development: We will develop and test a fix
- Security Advisory: We will publish a GitHub Security Advisory
- Version Release: We will release a patched version
- Public Disclosure: We will publicly disclose after patch is available
Timeline: We aim to complete this process within 30 days for critical vulnerabilities.
How to Stay Informed:
- GitHub Security Advisories: Watch the repository for security advisories
- Release Notes: Check
CHANGELOG.mdfor security-related updates - GitHub Releases: Subscribe to release notifications
Automatic Updates:
If you have Dependabot enabled, you'll receive automated PRs for security updates.
- Keep session logs private (don't commit to public repos)
- Review logs before sharing for debugging
- Use privacy filters when sharing data
- Keep MCP Audit updated to latest version
- Establish data sharing policies
- Use private repositories for session data
- Configure access controls on log directories
- Document which data is safe to share publicly
- Use privacy filters before sharing session data
- Never commit actual session logs to public repos
- Use example/sanitized data for documentation
- Document what data users should redact
- Vulnerabilities in MCP Audit code
- Dependency vulnerabilities
- Security issues in data processing
- Privacy leaks in session logs
- Insecure file handling
- Vulnerabilities in MCP servers (report to respective projects)
- Issues in underlying platforms (Claude Code, Codex CLI, etc.)
- Generic security issues with Python or dependencies (report upstream)
- Social engineering attacks
- Physical access to user systems
- Security Issues: [email protected]
- General Issues: https://github.com/littlebearapps/mcp-audit/issues
- General Contact: https://littlebearapps.com
Last Updated: 2025-12-13