Skip to content

Security: badchars/mcp-browser

Security

.github/SECURITY.md

Security Policy

Supported Versions

Version Supported
0.2.x
0.1.x
< 0.1

Reporting a Vulnerability

We take security vulnerabilities seriously. If you discover a security vulnerability in MCP Browser, please follow these steps:

1. Do NOT create a public GitHub issue

Security vulnerabilities should be reported privately to protect users.

2. Email Security Report

Send an email to: [your-email@example.com]

Include the following information:

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact
  • Suggested fix (if any)

3. Response Timeline

  • Acknowledgment: Within 48 hours
  • Initial Assessment: Within 1 week
  • Resolution: Within 30 days (depending on severity)

4. Disclosure Policy

  • We will acknowledge receipt of your vulnerability report
  • We will provide regular updates on our progress
  • We will credit you in our security advisories (unless you prefer to remain anonymous)
  • We will coordinate public disclosure with you

Security Best Practices

When using MCP Browser for security testing:

  1. Only test systems you own or have explicit permission to test
  2. Follow responsible disclosure practices
  3. Respect rate limits and don't overload target systems
  4. Use appropriate session management
  5. Keep the tool updated to the latest version

Security Features

MCP Browser includes several security-focused features:

  • XSS Vulnerability Scanning: Automated detection and testing
  • JavaScript Analysis: Comprehensive JS file analysis
  • Network Monitoring: Request/response logging
  • Session Management: Secure browser session handling

License Notice

This tool is provided under a Non-Commercial License. Commercial use requires explicit permission from the author.


Thank you for helping keep MCP Browser and its users safe!

There aren’t any published security advisories