Skip to content

Security: preset-io/testmcpy

Security

SECURITY.md

Security Policy

Reporting a Vulnerability

We take the security of testmcpy seriously. If you discover a security vulnerability, please report it responsibly.

Please do NOT report security vulnerabilities through public GitHub issues.

Instead, please report security vulnerabilities through one of the following methods:

  1. GitHub Security Advisories (Recommended)

    • Navigate to the Security Advisories page
    • Click "Report a vulnerability"
    • Fill out the form with details about the vulnerability
  2. GitHub

What to Include in Your Report

To help us understand and address the issue quickly, please include:

  • Description: A clear description of the vulnerability
  • Impact: What type of vulnerability is it? (e.g., authentication bypass, code execution, information disclosure)
  • Affected Components: Which parts of testmcpy are affected?
  • Reproduction Steps: Detailed steps to reproduce the vulnerability
  • Proof of Concept: If possible, include code or commands that demonstrate the issue
  • Suggested Fix: If you have ideas on how to fix the issue, please share them

What to Expect

After you submit a vulnerability report:

  1. Acknowledgment: We will acknowledge receipt of your report within 2 business days
  2. Investigation: We will investigate and validate the vulnerability
  3. Updates: We will keep you informed about our progress
  4. Resolution: We will work on a fix and coordinate a disclosure timeline with you
  5. Credit: If you wish, we will credit you in the security advisory and release notes

Disclosure Policy

  • Coordinated Disclosure: We follow coordinated disclosure practices
  • Timeline: We aim to resolve critical vulnerabilities within 90 days
  • Public Disclosure: After a fix is released, we will publish a security advisory

Security Best Practices for Users

When using testmcpy, follow these security best practices:

API Keys and Credentials

  1. Never commit credentials: Do not commit API keys, tokens, or secrets to version control
  2. Use environment variables: Store sensitive configuration in environment variables or secure config files
  3. File permissions: Ensure your ~/.testmcpy config file has restricted permissions (600)
    chmod 600 ~/.testmcpy
  4. Rotate keys regularly: Periodically rotate your API keys for Anthropic, OpenAI, and MCP services

MCP Service Security

  1. Secure MCP URLs: Only connect to trusted MCP services over HTTPS
  2. Token Management: Use short-lived JWT tokens when possible (enable dynamic JWT auth)
  3. Network Security: Be cautious when exposing MCP services on public networks
  4. Validate responses: Be aware that MCP tools can execute operations with your credentials

Test File Security

  1. Review test files: Inspect YAML test files from untrusted sources before running them
  2. Limit prompts: Be cautious with prompts that might trigger unintended tool calls
  3. Sandbox testing: Test unknown MCP services in isolated environments first

Web UI Security

  1. Local access: By default, the web UI runs on localhost only (127.0.0.1)
  2. Authentication: If exposing the web UI, implement proper authentication
  3. HTTPS: Use HTTPS when accessing the web UI over a network

Known Security Considerations

LLM-Specific Risks

  • Prompt Injection: LLMs may be susceptible to prompt injection attacks
  • Tool Misuse: Malicious prompts could potentially trigger unintended tool calls
  • Data Leakage: Be careful about sensitive data in prompts or MCP responses

Dependency Security

We regularly update dependencies to address known vulnerabilities. You can check for outdated dependencies:

pip list --outdated

To update testmcpy to the latest version:

pip install --upgrade testmcpy

Security Update Policy

  • Critical vulnerabilities: Patched within 7 days, emergency releases if needed
  • High severity: Patched within 30 days
  • Medium/Low severity: Patched in next regular release

Questions?

If you have questions about this security policy or general security concerns (not vulnerability reports), please:

There aren’t any published security advisories