| Version | Supported |
|---|---|
| 1.0.x | ✅ |
We take security seriously at poly-cloud-mcp. If you discover a security vulnerability, please follow responsible disclosure practices.
- Email: Send details to security@hyperpolymath.org
- Encrypted Communication: Use our PGP key available at https://hyperpolymath.org/gpg/security.asc
- Do NOT create public GitHub issues for security vulnerabilities
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (optional)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 30 days for critical issues
This project implements several security practices:
- Signed Commits: All commits are GPG-signed
- Minimal Permissions: Container runs as non-root user (UID 1000)
- Secure Base Image: Uses Chainguard Wolfi base image
- Pinned Dependencies: GitHub Actions use SHA-pinned versions
- No Credential Storage: Credentials are passed via environment variables only
- Input Validation: All tool inputs are validated before execution
Security reports are accepted for:
- The poly-cloud-mcp server code
- Container image vulnerabilities
- CI/CD pipeline security issues
- Documentation security errors
Out of scope:
- Vulnerabilities in underlying cloud provider CLIs (aws, gcloud, az, doctl)
- Issues in the Deno runtime itself
- Social engineering attacks
We maintain an acknowledgments page for security researchers who responsibly disclose vulnerabilities: https://hyperpolymath.org/security/acknowledgments
- Credential Security: Never commit cloud credentials. Use environment variables or mounted config files.
- Network Isolation: Run the MCP server in a network-isolated environment when possible.
- Least Privilege: Configure cloud CLI credentials with minimal required permissions.
- Audit Logs: Enable cloud provider audit logging for operations performed via this tool.
- Update Regularly: Keep the container image and cloud CLIs updated.