/ SECURITY.md
SECURITY.md
1 # Security Policy 2 3 ## Supported Versions 4 5 | Version | Supported | 6 | ------- | ------------------ | 7 | 1.x.x | :white_check_mark: | 8 | < 1.0 | :x: | 9 10 ## Reporting a Vulnerability 11 12 If you discover a security vulnerability in poly-observability-mcp, please report it responsibly: 13 14 ### Contact 15 16 - **Email:** security@hyperpolymath.org 17 - **GPG Key:** https://hyperpolymath.org/gpg/security.asc 18 - **Preferred Languages:** English, Dutch 19 20 ### What to Include 21 22 When reporting a vulnerability, please provide: 23 24 1. Description of the vulnerability 25 2. Steps to reproduce 26 3. Potential impact assessment 27 4. Any suggested fixes (optional) 28 29 ### Response Timeline 30 31 - **Initial Response:** Within 48 hours 32 - **Status Update:** Within 7 days 33 - **Resolution Target:** Within 30 days for critical issues 34 35 ### What to Expect 36 37 - We will acknowledge your report within 48 hours 38 - We will investigate and provide a status update within 7 days 39 - If accepted, we will work on a fix and coordinate disclosure 40 - If declined, we will explain our reasoning 41 - Credit will be given to reporters (unless anonymity is requested) 42 43 ### Scope 44 45 This security policy covers: 46 47 - The poly-observability-mcp MCP server 48 - All adapter implementations (Prometheus, Grafana, Loki, Jaeger) 49 - Configuration and deployment files 50 - CI/CD workflows 51 52 ### Out of Scope 53 54 - Security issues in upstream dependencies (report to respective projects) 55 - Security of the observability backends themselves (Prometheus, Grafana, Loki, Jaeger) 56 - Issues in third-party integrations 57 58 ## Security Best Practices 59 60 When deploying poly-observability-mcp: 61 62 1. **Environment Variables:** Store API keys and credentials in environment variables, never in code 63 2. **Network Security:** Use TLS/HTTPS when connecting to observability backends in production 64 3. **Access Control:** Limit MCP server access to authorized clients only 65 4. **API Keys:** Use read-only API keys where possible (especially for Grafana) 66 5. **Container Security:** Run containers as non-root user (default in provided Containerfile) 67 68 ## Security Features 69 70 - No hardcoded credentials 71 - Environment-based configuration 72 - Non-root container execution 73 - SHA-pinned GitHub Actions 74 - Automated security scanning (TruffleHog, CodeQL) 75 - RFC 9116 compliant security.txt