We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 2.x.x | ✅ |
| < 2.0 | ❌ |
We take the security of faf-mcp seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Open a public GitHub issue for security vulnerabilities
- Disclose the vulnerability publicly before we have had a chance to address it
- Exploit the vulnerability beyond what is necessary to demonstrate it
Report security issues via email to: team@faf.one
Include the following information:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting)
- Full paths of source file(s) related to the manifestation of the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
When you report a security issue, you can expect:
- Acknowledgment within 24 hours - We will confirm receipt of your report
- Initial assessment within 72 hours - We will provide our initial evaluation
- Regular updates - We will keep you informed as we work on a fix
- Coordinated disclosure - We will work with you on disclosure timing
- Credit - We will acknowledge your contribution (unless you prefer to remain anonymous)
- We will respond to your report promptly
- We will keep you informed of our progress
- We will treat your report confidentially
- We will credit you for responsible disclosure (if desired)
- We will work to issue a fix as quickly as possible
When using faf-mcp:
- Keep your installation up to date
- Only install from official sources (npm, GitHub releases)
- Verify package integrity when possible
- Review the permissions required by the MCP server
- Use your MCP client from official Anthropic channels only
- Follow secure coding practices
- Never commit sensitive data (API keys, tokens, credentials)
- Use environment variables for configuration
- Validate all inputs
- Follow our TypeScript strict mode requirements
- Run security audits before submitting PRs:
npm audit npm run build npm test
We maintain minimal dependencies to reduce attack surface:
- Only one production dependency (MCP SDK)
- Regular dependency audits
- Automated security updates via Dependabot
- No deprecated or unmaintained dependencies
- faf-mcp operates within the Model Context Protocol (MCP) framework
- It requires filesystem access to manage .faf files
- All operations are local to the user's machine
- No data is transmitted to external services
The server requires read/write access to:
- Project directories for .faf file management
- your MCP client configuration directory (for MCP setup)
This access is necessary for core functionality and is limited to user-initiated operations.
- Security updates are released as soon as fixes are available
- Critical vulnerabilities receive immediate attention
- All security updates are documented in CHANGELOG.md
- Users are notified via GitHub Security Advisories
Our typical timeline:
- Day 0: Report received
- Day 1: Acknowledgment sent
- Day 3: Initial assessment completed
- Day 7-30: Fix developed and tested
- Day 30-90: Coordinated disclosure
- Day 90+: Public disclosure if fix is delayed
We aim for fixes within 30 days for high-severity issues.
We recognize researchers who help us improve security:
No vulnerabilities reported yet
If you report a vulnerability, we will list you here (with your permission).
- Security issues: team@faf.one
- General questions: GitHub Discussions
- Project maintainer: Wolfe James (ORCID: 0009-0007-0801-3841)
Last updated: November 2025
Thank you for helping keep faf-mcp and its users safe.