We take security seriously and actively maintain the following versions of Canvas MCP Client:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
If you discover a security vulnerability in Canvas MCP Client, please help us protect our users by reporting it responsibly.
Please DO NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
Email: contact@visona.me (or create a private security advisory on GitHub)
Include as much information as possible:
- Type of vulnerability
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability
- Any possible mitigations you've identified
-
Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours.
-
Investigation: We will investigate the issue and determine its impact and severity.
-
Updates: We will keep you informed of our progress as we work on a fix.
-
Resolution: Once we've developed a fix, we will:
- Release a security patch
- Publicly disclose the vulnerability (with credit to you, if desired)
- Update our security advisory
-
Timeline: We aim to resolve critical vulnerabilities within 7 days and other vulnerabilities within 30 days.
When using Canvas MCP Client, we recommend following these security best practices:
- Use HTTPS: Always use HTTPS in production environments
- Strong Secrets: Use strong, randomly generated secrets for
SECRET_KEY - Environment Variables: Never commit API keys or secrets to version control
- Regular Updates: Keep Canvas MCP Client and all dependencies up to date
- Firewall Rules: Configure appropriate firewall rules to restrict access
- Database Security: Use strong passwords for database connections
- Backups: Maintain regular, encrypted backups of your data
- Encryption: API keys and credentials are encrypted at rest using industry-standard encryption
- Local Storage: All credentials are stored locally on your infrastructure
- No Transmission: Credentials are never transmitted to external services except the configured AI providers
- Rotation: Regularly rotate API keys and credentials
- Least Privilege: Use API keys with minimal required permissions
- Trusted Sources: Only configure MCP servers from trusted sources
- Review Permissions: Review what permissions and access each MCP server requires
- Isolation: Consider running MCP servers in isolated environments
- Monitoring: Monitor MCP server connections and activities
- Updates: Keep MCP servers updated to their latest versions
- Official Images: Use official Docker images when possible
- Volume Permissions: Set appropriate permissions on mounted volumes
- Network Isolation: Use Docker networks to isolate services
- Security Scanning: Regularly scan Docker images for vulnerabilities
- Updates: Keep Docker and Docker Compose updated
- Local-First: All user data is stored locally on your infrastructure
- No Telemetry: Canvas MCP Client does not collect or transmit telemetry data
- No Analytics: No usage analytics are collected
- API Communication: The only external communication is with your configured AI providers and MCP servers
Current version (1.x) does not include multi-user authentication as it's designed for single-user, self-hosted deployment. If you need to expose Canvas MCP Client to multiple users:
- Use a reverse proxy with authentication (e.g., Nginx with Basic Auth, OAuth2 Proxy)
- Implement network-level access controls
- Consider VPN access for remote users
We are considering the following security enhancements for future releases:
- Optional multi-user authentication system
- Role-based access control (RBAC)
- Audit logging for sensitive operations
- Two-factor authentication support
- API rate limiting
- Content Security Policy (CSP) headers
- Security headers automation
Security updates are released as soon as fixes are available. Subscribe to:
- GitHub Security Advisories: Watch the repository for security advisories
- Release Notes: Check CHANGELOG.md for security-related updates
- GitHub Releases: Security patches are tagged with
securitylabel
- We follow responsible disclosure practices
- Security issues are addressed with high priority
- Public disclosure occurs only after a fix is available
- Security researchers are credited (with permission) in release notes
We appreciate security researchers who help keep Canvas MCP Client secure. Contributors who report valid security vulnerabilities will be listed here (with their permission):
No security vulnerabilities have been publicly disclosed yet.
Canvas MCP Client is designed to help users maintain compliance with:
- GDPR: Data is stored locally, giving users full control
- Data Sovereignty: All data remains on user's infrastructure
- Privacy Regulations: No data is shared with third parties (except configured AI providers)
- OWASP Top 10
- FastAPI Security Documentation
- Next.js Security Best Practices
- Docker Security Best Practices
If you have questions about security that don't involve reporting a vulnerability, please:
- Open a GitHub Discussion
- Check existing documentation
- Review this security policy
Last Updated: October 2025 Version: 1.0