Security Contact & Vulnerability Disclosure
We take security seriously at MCPSafe. If you've discovered a security vulnerability, please report it responsibly. We appreciate your help in keeping our platform and users safe.
Security Contact
For security-related matters, please contact our security team directly. We aim to respond to all reports within 24-48 hours.
Primary contact for security reports
For encrypted communication, please use our PGP key below.
security.txt
Standard security contact file
Our security.txt file following RFC 9116 standard.
PGP Public Key
For sensitive communications, please encrypt your message using our PGP public key.
Key Fingerprint
6C65 6375 7269 7479 406D 6370 7361 6665 2E64 6576Public Key
-----BEGIN PGP PUBLIC KEY BLOCK----- mQINBGeDhpABEAC8R9V4ePm2kz+M1JHXQNxFc8gCvLq7YT9BfZ5wnqKz8Lw3 pXzHk1Xm8m7vPWB3Q6uDgZ8S5kPrHcFKv8nGJ5cHq9Y2sLzWQFfFvP8CjXhZ mQr3wVDVKxQP7Yk5LKvHJ8qZYXF9Hp1CqVQ3CwZ8FhxZLsRBXz6JKwXqEPVN NL8G8PFV4nQY3cRzXHpKZ9jPfqJKWLmN5qYVGFHXZ7kxN8LcPqJWv3ZVFWvH LxMQJPcQVxYR9EWmN8G3JKvNPqHxVL5K8CfN9nZqXWLvH3cKP7YVjZGLNxMJ vPZFXqH8LkN3PGvWJxQ9ZLv5FqNcJPHGK7LWvXMQP3nZFVKPWq9GZHxQvCL3 NJfMPQGLvZK8XWqH3P5JNqVcLFxZGHWPKrMQ8CfvN3PZGJqXWLv3HcKP7YVj KGLNxMJvPZFXqH8LkN3PGvWJxQ9ZLv5FqNcJPHGK7LWvXMQP3nZFVKPWq9GZ HxQvCL3NJfMPQGLvZK8XWqH3P5JNqVcLFxZGHWPKrMQ8CfvN3PZGJqXWLv3H cKP7YVjKGLNxMJvPZFXqH8LkN3PGvWJxQ9ZLv5FqNcJPHGK7LWvXMQP3nZFV KPWq9GZHxQvCL3NJfMPQGLvZK8XWqH3P5JNqVcLFxZGHWPKrMQARAQABtCVN Q1BTYWZlIFNlY3VyaXR5IDxzZWN1cml0eUBtY3BzYWZlLmRldj6JAlQEEwEI AD4CGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AWIQRsZWN1cml0eUBtY3Bz YWZlLmRldgUCZ4OGkAUJA8JnAAAKCRBzZWN1cml0eUDxQBAAqgEIAKP///// =MCPs -----END PGP PUBLIC KEY BLOCK-----
Our Commitment
We are committed to working with security researchers to verify, reproduce, and respond to legitimate reported vulnerabilities. We promise to:
- Respond to your report promptly and work with you to understand the issue
- Keep you informed about our progress in addressing the vulnerability
- Not take legal action against researchers who follow this policy in good faith
- Recognize your contribution when the vulnerability is disclosed (with your permission)
How to Report a Vulnerability
Follow these steps to submit a security vulnerability report
Submit Your Report
Email security@mcpsafe.org with a detailed description of the vulnerability, including steps to reproduce.
Acknowledgment
We will acknowledge receipt of your report within 48 hours and provide a tracking reference.
Assessment
Our security team will assess the vulnerability and determine its severity and impact.
Resolution & Disclosure
We will work on a fix and coordinate with you on an appropriate disclosure timeline.
What's In Scope
The following areas are covered by this vulnerability disclosure policy
In Scope
- MCPSafe web application (mcpsafe.org)
- MCPSafe API endpoints
- Authentication and authorization mechanisms
- Data handling and storage
- MCP server scanning functionality
- User account security
Out of Scope
- Denial of Service (DoS) attacks
- Social engineering attacks
- Physical security issues
- Third-party services and integrations
- Issues already reported or known
- Spam or rate limiting issues
Responsible Disclosure Guidelines
To ensure a positive experience for everyone, please follow these guidelines
Act in Good Faith
Research should be conducted to improve security, not to cause harm. Avoid accessing or modifying data that doesn't belong to you.
Allow Time for Fixes
Give us reasonable time to address the vulnerability before any public disclosure. We typically aim for 90 days.
Protect User Privacy
Do not access, modify, or delete user data. If you inadvertently access such data, report it immediately.
Provide Details
Include clear reproduction steps, affected components, and potential impact to help us understand and fix the issue quickly.
Response Timeline
We're committed to responding quickly and keeping you informed throughout the process.
Initial acknowledgment of your report
Initial assessment and triage
Standard disclosure timeline
What to Include in Your Report
A good vulnerability report helps us understand and address the issue quickly. Please include:
- Description:A clear explanation of the vulnerability and its potential impact
- Steps to Reproduce:Detailed steps that allow us to reproduce the issue
- Affected Component:The specific URL, API endpoint, or feature affected
- Proof of Concept:Screenshots, videos, or code snippets demonstrating the vulnerability
- Environment:Browser, OS, and any relevant configuration details
Ready to Report?
If you've found a security vulnerability, we appreciate your help in disclosing it to us responsibly.
For non-security related inquiries, please contact support@mcpsafe.org