| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability:
- Do NOT open a public issue
- Email the maintainer or open a private security advisory on GitHub
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- This MCP server processes text locally or through serverless functions
- No user data is stored or logged
- No external API calls are made
- Text analysis happens in-memory only
When deploying your own instance:
- Use HTTPS for HTTP transport endpoints
- Keep dependencies updated:
npm audit - Follow Vercel's security best practices
- Review environment variable handling
When using this MCP server:
- Review the code before connecting clients
- Use stdio transport for local-only access
- Validate that HTTP endpoints use HTTPS
- Keep your MCP client updated
- HTTP transport has no built-in authentication (deploy privately or add auth layer)
- No rate limiting on public deployments (add via Vercel configuration)
- Text analysis results are returned as-is (no sanitization needed as output is informational)
Security updates will be released as patch versions and announced via GitHub releases.