| Version | Supported |
|---|---|
| 1.0.x | ✅ |
We take the security of Servidor MCP seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via direct message on BlueSkye at bufigol.bsky.social. You should receive a response within 48 hours. If for some reason you do not, please follow up to ensure we received your original message.
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
- Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
This information will help us triage your report more quickly.
We prefer all communications to be in English or Spanish.
We follow the principle of Responsible Disclosure.
We implement the following security measures:
- Regular security audits
- Dependency updates
- Code review process
- Secure coding practices
- Input validation
- Output encoding
- Error handling
- Logging and monitoring
- Access control
- Data encryption
When using Servidor MCP, please follow these security best practices:
- Keep your system and dependencies up to date
- Use strong passwords and authentication
- Implement proper access controls
- Monitor system logs
- Regular backups
- Follow the principle of least privilege
- Implement proper error handling
- Use secure communication channels
- Regular security assessments
- Stay informed about security updates
We will release security updates as soon as possible after a vulnerability is fixed. Security updates will be clearly marked in the release notes and will be available through the standard update channels.
If you have any security-related questions or concerns, please contact us via direct message on BlueSkye at bufigol.bsky.social.