🔐 MCP Gateway v0.3.1 - 2025-01-11 Security, XSS protection and Data Validation (Pydantic, UI) #381
crivetimihai
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
🔐 MCP Gateway v0.3.1 – 2025-01-11
This security-focused release delivers comprehensive input validation, output escaping, and data sanitization to protect against XSS and injection attacks when handling data from untrusted MCP servers. It also includes UI improvements and code quality enhancements.
🔒 Security First: Defense in Depth
This release prioritizes defense in depth with multiple layers of security validation:
✨ Highlights
/admin
and main API endpoints with configurable rules ([Security]: Add input validation for /admin endpoints #339, [Security]: Add input validation for main API endpoints (depends on #339 /admin API validation) #340)🚨 Important Limitations
🆕 Added
Security Enhancements
Comprehensive Input Validation Framework ([Security]: Add input validation for /admin endpoints #339, [Security]: Add input validation for main API endpoints (depends on #339 /admin API validation) #340):
/admin
endpoints validated – tools, resources, prompts, gateways, and servers^[a-zA-Z0-9_\-\s]+$
, tool names^[a-zA-Z][a-zA-Z0-9_]*$
http://
,https://
,ws://
,wss://
Enhanced Output Handling ([Security]: Implement output escaping for user data in UI #336):
Features
Fixes
🔄 Changed
Code Quality Achievement ([Security]: Eliminate all lint issues in web stack #338):
Security Defaults:
MCPGATEWAY_UI_ENABLED=false
MCPGATEWAY_ADMIN_API_ENABLED=false
.env
file to explicitly enable these featuresValidation Configuration – New environment variables:
Performance – Validation overhead kept under 10ms per request
Security Pipeline – Every PR now passes through 24+ automated security scans including:
🔐 Security Notes
Defense in Depth Strategy
MCP Gateway is designed as one component in a comprehensive security strategy:
Review Your Configuration
Admin features are now disabled by default for security:
Developer Security Tools
Run the same 24+ security scans locally that execute in CI/CD:
📦 Upgrade Instructions (pypy)
Update your package:
Review security settings in your
.env
:📋 Production Deployment Checklist
When deploying MCP Gateway v0.3.1:
MCPGATEWAY_UI_ENABLED=false
)MCPGATEWAY_ADMIN_API_ENABLED=false
)See the full Security Policy for complete deployment guidelines.
👥 Contributors
This security-focused release was delivered through excellent teamwork. Some of the items closed in 0.3.1 include:
Special thanks to all contributors who helped make MCP Gateway more secure and robust!
🔗 Resources
ghcr.io/ibm/mcp-context-forge:v0.3.1
This discussion was created from the release 🔐 MCP Gateway v0.3.1 - 2025-01-11 Security, XSS protection and Data Validation (Pydantic, UI).
Beta Was this translation helpful? Give feedback.
All reactions