| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
If you discover a security vulnerability in poly-observability-mcp, please report it responsibly:
- Email: security@hyperpolymath.org
- GPG Key: https://hyperpolymath.org/gpg/security.asc
- Preferred Languages: English, Dutch
When reporting a vulnerability, please provide:
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Any suggested fixes (optional)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 30 days for critical issues
- We will acknowledge your report within 48 hours
- We will investigate and provide a status update within 7 days
- If accepted, we will work on a fix and coordinate disclosure
- If declined, we will explain our reasoning
- Credit will be given to reporters (unless anonymity is requested)
This security policy covers:
- The poly-observability-mcp MCP server
- All adapter implementations (Prometheus, Grafana, Loki, Jaeger)
- Configuration and deployment files
- CI/CD workflows
- Security issues in upstream dependencies (report to respective projects)
- Security of the observability backends themselves (Prometheus, Grafana, Loki, Jaeger)
- Issues in third-party integrations
When deploying poly-observability-mcp:
- Environment Variables: Store API keys and credentials in environment variables, never in code
- Network Security: Use TLS/HTTPS when connecting to observability backends in production
- Access Control: Limit MCP server access to authorized clients only
- API Keys: Use read-only API keys where possible (especially for Grafana)
- Container Security: Run containers as non-root user (default in provided Containerfile)
- No hardcoded credentials
- Environment-based configuration
- Non-root container execution
- SHA-pinned GitHub Actions
- Automated security scanning (TruffleHog, CodeQL)
- RFC 9116 compliant security.txt