We actively support the following versions of JMX MCP Server with security updates:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
We take security vulnerabilities seriously. If you discover a security vulnerability in JMX MCP Server, please report it responsibly.
- Do NOT create a public GitHub issue for security vulnerabilities
- Email security reports to: itzdarkblitz@protonmail.com
- Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (if available)
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Updates: We will keep you informed of our progress throughout the investigation
- Resolution: We aim to resolve critical vulnerabilities within 30 days
When using JMX MCP Server:
- Network Security: Use secure connections for remote JMX access
- Access Control: Implement proper authentication and authorization
- Monitoring: Monitor JMX access logs for suspicious activity
- Updates: Keep the server updated to the latest version
- Configuration: Review security configuration settings regularly
This security policy covers:
- JMX MCP Server core functionality
- MCP protocol implementation
- JMX connection handling
- Security validation components
- Third-party dependencies (report to respective maintainers)
- Issues in Java Virtual Machine or operating system
- Misconfigurations in deployment environments
JMX MCP Server includes several built-in security features:
- Input Validation: All inputs are validated before processing
- Access Control: Configurable security policies for JMX operations
- Operation Filtering: Dangerous operations can be blocked
- Audit Logging: Security events are logged for monitoring
Thank you for helping keep JMX MCP Server secure!