The Cerebras MCP project takes security seriously. If you discover a security vulnerability in the cerebras-code-mcp package, please report it responsibly.
To report a security issue, please:
- Do NOT create a public GitHub issue
- Email us at: security@cerebras.net
- Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (if available)
This MCP server handles:
- API keys for Cerebras and OpenRouter services
- File system operations through the
writetool - IDE configuration files and settings
- Environment variables and system paths
- API Keys: Store securely in environment variables, never in code
- File Operations: The
writetool operates with user permissions - IDE Integration: Configuration files are created in standard IDE locations
- Network Requests: All API calls use HTTPS encryption
We appreciate security researchers who help keep our users safe. When reporting vulnerabilities:
- Allow reasonable time for investigation and patching
- Avoid accessing or modifying user data beyond what's necessary to demonstrate the issue
- Do not perform actions that could harm users or degrade service quality
- Initial Response: Within 48 hours of report
- Status Updates: Weekly updates on investigation progress
- Resolution: Security fixes will be prioritized and released as soon as possible
Security updates are provided for:
- Latest stable release
- Previous major version (if applicable)
Please keep your installation up to date by running:
npm update -g cerebras-code-mcp