We take the security of testmcpy seriously. If you discover a security vulnerability, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities through one of the following methods:
-
GitHub Security Advisories (Recommended)
- Navigate to the Security Advisories page
- Click "Report a vulnerability"
- Fill out the form with details about the vulnerability
-
GitHub
- Reach out to @aminghadersohi directly via GitHub
To help us understand and address the issue quickly, please include:
- Description: A clear description of the vulnerability
- Impact: What type of vulnerability is it? (e.g., authentication bypass, code execution, information disclosure)
- Affected Components: Which parts of testmcpy are affected?
- Reproduction Steps: Detailed steps to reproduce the vulnerability
- Proof of Concept: If possible, include code or commands that demonstrate the issue
- Suggested Fix: If you have ideas on how to fix the issue, please share them
After you submit a vulnerability report:
- Acknowledgment: We will acknowledge receipt of your report within 2 business days
- Investigation: We will investigate and validate the vulnerability
- Updates: We will keep you informed about our progress
- Resolution: We will work on a fix and coordinate a disclosure timeline with you
- Credit: If you wish, we will credit you in the security advisory and release notes
- Coordinated Disclosure: We follow coordinated disclosure practices
- Timeline: We aim to resolve critical vulnerabilities within 90 days
- Public Disclosure: After a fix is released, we will publish a security advisory
When using testmcpy, follow these security best practices:
- Never commit credentials: Do not commit API keys, tokens, or secrets to version control
- Use environment variables: Store sensitive configuration in environment variables or secure config files
- File permissions: Ensure your
~/.testmcpyconfig file has restricted permissions (600)chmod 600 ~/.testmcpy - Rotate keys regularly: Periodically rotate your API keys for Anthropic, OpenAI, and MCP services
- Secure MCP URLs: Only connect to trusted MCP services over HTTPS
- Token Management: Use short-lived JWT tokens when possible (enable dynamic JWT auth)
- Network Security: Be cautious when exposing MCP services on public networks
- Validate responses: Be aware that MCP tools can execute operations with your credentials
- Review test files: Inspect YAML test files from untrusted sources before running them
- Limit prompts: Be cautious with prompts that might trigger unintended tool calls
- Sandbox testing: Test unknown MCP services in isolated environments first
- Local access: By default, the web UI runs on localhost only (127.0.0.1)
- Authentication: If exposing the web UI, implement proper authentication
- HTTPS: Use HTTPS when accessing the web UI over a network
- Prompt Injection: LLMs may be susceptible to prompt injection attacks
- Tool Misuse: Malicious prompts could potentially trigger unintended tool calls
- Data Leakage: Be careful about sensitive data in prompts or MCP responses
We regularly update dependencies to address known vulnerabilities. You can check for outdated dependencies:
pip list --outdatedTo update testmcpy to the latest version:
pip install --upgrade testmcpy- Critical vulnerabilities: Patched within 7 days, emergency releases if needed
- High severity: Patched within 30 days
- Medium/Low severity: Patched in next regular release
If you have questions about this security policy or general security concerns (not vulnerability reports), please:
- Open a GitHub Discussion
- Open a GitHub Issue