If you discover a security vulnerability in Local MCP Gateway, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please send an email to the maintainers or use GitHub's private vulnerability reporting feature.
When reporting a vulnerability, please include:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution: Depends on severity and complexity
We provide security updates for the latest stable release only.
| Version | Supported |
|---|---|
| Latest | Yes |
| Older | No |
When using Local MCP Gateway:
- Keep dependencies updated - Run
pnpm updateregularly - Protect your
.envfile - Never commit secrets to git - Use HTTPS in production - Especially for OAuth flows
- Review MCP server permissions - Only enable servers you trust
We appreciate security researchers who help keep this project safe. Contributors who report valid vulnerabilities will be acknowledged (with permission) in our release notes.