We take security seriously and provide security updates for the following versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in deploy-mcp, please help us maintain the security of the project by reporting it responsibly.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please send an email to: alex.potapenko.dev@gmail.com
Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes or mitigations
- Initial Response: Within 48 hours of receiving your report
- Status Update: Weekly updates on investigation progress
- Resolution: Security fixes are prioritized and typically released within 7-14 days
- We will acknowledge receipt of your vulnerability report within 2 business days
- We will provide regular updates on our investigation and remediation timeline
- We will notify you when the vulnerability has been fixed
- We will publicly disclose the vulnerability details after a fix has been released and deployed
When using deploy-mcp in production:
- API Token Security: Store tokens in environment variables, never in code or version control
- Token Permissions: Use read-only API tokens when possible to minimize risk
- Token Rotation: Regularly rotate API tokens for enhanced security
- Network Security: Ensure secure connections when accessing deployment platforms
- Updates: Keep deploy-mcp and its dependencies up to date
deploy-mcp includes several security-conscious design decisions:
- Local-only token storage - API tokens never leave your machine
- No data collection - Zero tracking or analytics of user data
- Direct API calls - All requests go directly to deployment platforms
- Input validation using Zod schemas to prevent injection attacks
- Minimal dependencies to reduce supply chain risks
- Strict TypeScript compilation to catch potential issues at build time
Thank you for helping keep deploy-mcp and the Node.js ecosystem secure.