If you discover a security vulnerability in mcp-ripestat, please report it responsibly.
Please report security vulnerabilities by creating a private security advisory on GitHub:
- Go to the Security tab
- Click "Report a vulnerability"
- Provide detailed information about the vulnerability
Alternatively, you can email security concerns to the maintainer.
When reporting a vulnerability, please include:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if applicable)
We support the following versions of mcp-ripestat (three last minor releases):
Version | Supported |
---|---|
2.10.x | ✅ |
2.9.x | ✅ |
2.8.x | ✅ |
< 2.8 | ❌ |
Important: At current stage this MCP server does not provide authentication. Use firewall or other L3 networking to restrict access to the server.
- Deploy behind a firewall
- Use network-level access controls
- Consider VPN or private network deployment
- Monitor access logs
- Go dependencies are regularly updated
- Automated vulnerability scanning with govulncheck
- Container images scanned with Trivy
- Code is scanned with CodeQL
- Linting includes security checks
- Branch protection rules
We follow responsible disclosure practices:
- We will acknowledge receipt of vulnerability reports within 72 hours
- We will provide regular updates on the status of fixes
- We will credit reporters appropriately (unless they prefer to remain anonymous)
- We aim to fix critical vulnerabilities within 30 days
- We will coordinate with reporters on disclosure timing