We actively support the following versions of the Teamwork MCP Server with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
The Teamwork team takes security seriously. If you discover a security vulnerability in this MCP server, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities to:
- Email: security@teamwork.com
- Subject: [Security] Teamwork MCP Server - Brief description of vulnerability
When reporting a vulnerability, please include:
- Description: A clear description of the vulnerability
- Impact: The potential impact of the vulnerability
- Reproduction: Step-by-step instructions to reproduce the issue
- Affected Versions: Which versions of the MCP server are affected
- Environment: Go version, OS, and any other relevant environment details
- Proof of Concept: If applicable, include a minimal proof of concept
We will acknowledge receipt of your vulnerability report within 48 hours and will strive to:
- Provide an initial assessment within 5 business days
- Keep you informed of our progress toward a fix
- Notify you when the vulnerability is resolved
We kindly ask that you:
- Allow us reasonable time to address the vulnerability before public disclosure
- Do not access, modify, or delete data belonging to others
- Do not perform actions that could negatively impact Teamwork users or services
- Do not publicly disclose the vulnerability until we have had a chance to address it
When using this MCP server, we recommend following these security best practices:
- Never commit API keys to version control
- Store API keys securely using environment variables or secure credential stores
- Rotate API keys regularly
- Use the minimum required permissions for your integration
// ✅ Good: Use environment variables
apiKey := os.Getenv("TEAMWORK_API_KEY")
// ❌ Bad: Hardcoded API keys
apiKey := "tk_live_12345..."- OAuth2: Recommended for applications where users authenticate themselves
- Bearer Token: Suitable for server-to-server integrations
- Basic Auth: Legacy method, use only when necessary
- Always use HTTPS endpoints (this MCP server enforces HTTPS by default)
- Implement proper timeout and retry mechanisms
- Consider rate limiting in your application
- Avoid logging sensitive information in error messages
- Implement proper error handling to prevent information disclosure
// ✅ Good: Generic error handling
if err != nil {
log.Printf("API request failed: %v", err.Error())
return
}
// ❌ Bad: Logging potentially sensitive data
if err != nil {
log.Printf("Failed with token %s: %v", apiKey, err)
return
}- Only request the data you need
- Implement proper data validation
- Follow data retention policies
- Ensure secure data transmission and storage
This MCP server has minimal dependencies to reduce the attack surface:
- github.com/mark3labs/mcp-go: Model Context Protocol implementation
- github.com/teamwork/twapi-go-sdk: Teamwork API integration
- github.com/DataDog/dd-trace-go: Observability and tracing (optional)
- github.com/getsentry/sentry-go: Error monitoring (optional)
We regularly monitor our dependencies for known vulnerabilities and update them as needed.
Once a security vulnerability is resolved:
- We will publish a security advisory on GitHub
- Release notes will include security fix information
- We may coordinate with you on public disclosure timing
- Credit will be given to the reporter (unless they prefer to remain anonymous)
For non-security related questions about this MCP server:
- Open an issue on GitHub
- Check our documentation
For security-related inquiries: security@teamwork.com
This security policy is effective as of July 10, 2025 and may be updated from time to time.