We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
If you discover a security vulnerability within Capture MCP Server, please send an email to security@example.com. All security vulnerabilities will be promptly addressed.
Please do not report security vulnerabilities through public GitHub issues.
- Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
- Within 48 hours, we will acknowledge receipt of your vulnerability report
- Within 7 days, we will send a more detailed response indicating the next steps
- We will keep you informed about the progress towards fixing the vulnerability
- We will notify you when the vulnerability is fixed
When using Capture MCP Server:
-
API Key Management
- Never commit API keys to version control
- Use environment variables for sensitive configuration
- Rotate API keys regularly
- Restrict API key permissions to minimum required
-
Data Handling
- Be aware that procurement data may contain sensitive information
- Implement proper access controls in your application
- Log access to sensitive data appropriately
- Follow data retention policies
-
Network Security
- Use HTTPS for all API communications
- Implement proper rate limiting
- Monitor for unusual API usage patterns
-
Dependencies
- Keep all dependencies up to date
- Regularly audit dependencies for vulnerabilities
- Use
npm auditto check for known vulnerabilities
When we receive a security vulnerability report, we will:
- Confirm the vulnerability and determine its impact
- Work on a fix and prepare a security update
- Release the update and publish a security advisory
- Credit the reporter (unless they prefer to remain anonymous)
We ask that you:
- Give us reasonable time to fix the issue before public disclosure
- Make a good faith effort to avoid privacy violations and data destruction
- Not access or modify data without explicit permission
Thank you for helping keep Capture MCP Server and its users safe!