Skip to content

Security: LeadMagic/leadmagic-mcp

Security

SECURITY.md

πŸ”’ Security Policy

πŸ›‘οΈ Supported Versions

We actively maintain and provide security updates for the following versions:

Version Supported Status
1.0.x βœ… Yes Active
< 1.0 ❌ No Deprecated

🚨 Reporting a Vulnerability

Please do not report security vulnerabilities through public GitHub issues.

πŸ“§ Private Reporting

Send security issues directly to: security@leadmagic.io

Include the following information:

  • πŸ“‹ Description of the vulnerability
  • πŸ”„ Steps to reproduce the issue
  • πŸ“Š Impact assessment (who/what is affected)
  • πŸ› οΈ Suggested fix (if you have one)
  • πŸ”— Related files/code sections
  • πŸ“§ Your contact information

⏰ Response Timeline

  • 24 hours: Initial acknowledgment
  • 72 hours: Initial assessment and severity classification
  • 7 days: Detailed response with remediation plan
  • 30 days: Target resolution for high/critical issues

πŸ† Security Recognition

We appreciate responsible disclosure and will:

  • πŸ“ Credit you in our security advisories (if desired)
  • 🎁 Provide LeadMagic credits for valid vulnerabilities
  • πŸ† Recognition in our hall of fame

πŸ” Security Best Practices

πŸ”‘ API Key Security

βœ… Do:

  • Store API keys in environment variables
  • Use .env files for local development (never commit them)
  • Rotate API keys regularly
  • Use separate keys for different environments
  • Monitor API key usage in your dashboard

❌ Don't:

  • Hardcode API keys in source code
  • Share API keys in chat/email
  • Commit .env files to version control
  • Use production keys in development
  • Log API keys in application logs

🌐 Network Security

βœ… Recommended:

  • Use HTTPS for all API communications
  • Implement request timeout limits
  • Use firewall rules to restrict outbound connections
  • Monitor API usage and rate limits
  • Implement proper error handling to avoid information leakage

πŸ“± Client-Side Security

βœ… MCP Client Security:

  • Never expose API keys to client-side code
  • Run MCP server in secure environments only
  • Use least-privilege access principles
  • Regularly update MCP client applications
  • Monitor MCP server logs for suspicious activity

πŸ”§ Configuration Security

βœ… Secure Configuration:

# βœ… Good - Environment variable
export LEADMAGIC_API_KEY="your-secure-api-key"

# βœ… Good - .env file (not committed)
LEADMAGIC_API_KEY=your-secure-api-key

# ❌ Bad - Hardcoded in code
const apiKey = "lm_1234567890abcdef"; // NEVER DO THIS

πŸ” Security Features

πŸ›‘οΈ Built-in Security

Input Validation:

  • All inputs validated with Zod schemas
  • Type-safe TypeScript implementation
  • Sanitized error messages
  • Request size limits

Network Security:

  • HTTPS-only API communication
  • Configurable timeout settings
  • Automatic retry with exponential backoff
  • User-agent identification

Error Handling:

  • No sensitive data in error messages
  • Sanitized stack traces
  • Proper HTTP status codes
  • Logged security events

πŸ” Data Protection

Data Handling:

  • No persistent storage of sensitive data
  • Minimal data retention
  • Secure API communication
  • GDPR compliance considerations

Privacy:

  • No personal data logging
  • Configurable debug levels
  • Optional request/response logging
  • Data minimization principles

🚫 Known Security Considerations

⚠️ Environment Variables

Risk: API keys in environment variables can be accessed by any process Mitigation:

  • Use secure environment variable management
  • Restrict process access permissions
  • Monitor environment variable access

⚠️ Network Interception

Risk: API requests could be intercepted Mitigation:

  • Always use HTTPS (enforced by default)
  • Implement certificate pinning if needed
  • Use VPN for sensitive environments

⚠️ Rate Limiting

Risk: API abuse or DoS attacks Mitigation:

  • Built-in rate limiting respect
  • Configurable timeout settings
  • Monitor API usage patterns

πŸ“‹ Security Checklist

πŸ”§ For Developers

  • API keys stored securely (environment variables)
  • No sensitive data in logs
  • Input validation implemented
  • Error handling doesn't leak information
  • Dependencies regularly updated
  • Security tests included

πŸ› οΈ For Deployment

  • Secure environment configuration
  • Network access properly restricted
  • Monitoring and alerting configured
  • Regular security updates applied
  • Access logs monitored
  • Backup and recovery plans tested

πŸ‘₯ For Users

  • API keys rotated regularly
  • Usage monitored in dashboard
  • Secure development environment
  • Latest version installed
  • Security advisories subscribed

🚨 Incident Response

πŸ“ž If You Suspect a Security Issue

  1. πŸ›‘ Stop: Don't continue using potentially compromised systems
  2. πŸ”’ Secure: Rotate API keys immediately
  3. πŸ“§ Report: Contact security@leadmagic.io
  4. πŸ“‹ Document: Save logs and evidence
  5. ⏰ Monitor: Watch for unusual activity

πŸ”„ Our Response Process

  1. πŸ“§ Acknowledgment: We'll confirm receipt within 24 hours
  2. πŸ” Investigation: Assess impact and scope
  3. πŸ› οΈ Mitigation: Implement immediate fixes
  4. πŸ“’ Communication: Update affected users
  5. πŸ“ Post-mortem: Document lessons learned

πŸ“š Security Resources

πŸ“– Documentation

πŸ› οΈ Tools

πŸ“§ Contact

πŸ”„ Updates

This security policy is reviewed and updated regularly. Check back for the latest security guidance and best practices.

Last Updated: June 27, 2025 Version: 1.0.0


πŸ›‘οΈ Security is a shared responsibility. Thank you for helping keep LeadMagic MCP Server secure!

There aren’t any published security advisories