Skip to content

Security: samerfarida/mcp-ssh-orchestrator

SECURITY.md

Security Policy

Supported Versions

Security fixes are applied to actively maintained releases of mcp-ssh-orchestrator. Older releases receive fixes only when the backport effort is low and the issue is high severity.

Version Status
main branch Actively supported
v1.0.x Supported (critical + high fixes)
Older releases Best effort (consider upgrading)

If you are running an older release and cannot upgrade, please highlight that in your report so we can discuss options.

Reporting a Vulnerability

Please follow the steps below to report a potential vulnerability:

  1. Do not open a public GitHub issue or discussion.
  2. Submit a private report using one of the following channels:
  3. Include as much detail as possible:
    • Proof-of-concept or reproduction steps
    • Affected versions (commit SHA or release tag)
    • Impact assessment and suggested mitigations, if known
    • Preferred contact information and availability
  4. If you require encryption, use our OpenPGP key (openpgp4fpr:6775BF3F439A2A8A198DE10D4FC5342A979BD358) or mention it and we can send the key via email.

What Happens Next

  • Acknowledgement: We aim to acknowledge receipt within 2 business days.
  • Initial assessment: We will triage and respond with initial findings or questions within 5 business days.
  • Remediation plan: For confirmed vulnerabilities, we will coordinate on a fix, testing, and target release timeline. We may request additional information to reproduce or validate the issue.
  • Coordinated disclosure: We prefer to coordinate disclosure so end users can patch before details are public. We will agree on a disclosure window (typically 30–90 days depending on severity) and keep you updated on progress.

If you believe a vulnerability is being actively exploited or needs immediate attention, please mark your report as URGENT and include a reachable contact method.

Preferred Languages

We are comfortable receiving reports in English. If English is not convenient, please still contact us and we will work with you using translation tools.

Safe Harbor

We value legitimate security research. When you follow this policy and report issues responsibly, we will not pursue legal action or DMCA claims against you. Please:

  • Avoid privacy violations, service degradation, or destruction of data
  • Respect rate limits and always obtain consent before testing on systems you do not own

Security Guidance for Deployers

To keep your deployment secure, we recommend the following controls:

  • Use Ed25519 or 4096-bit RSA keys for SSH authentication
  • Keep require_known_host: true (enforced by default)
  • Configure network allowlists via network.allow_cidrs
  • Maintain a deny-by-default policy
  • Mount configuration, keys, and secrets as read-only volumes (:ro)

A fuller discussion of the orchestration controls, threat model, and audit pipeline is available in our wiki:

Thank you for helping keep mcp-ssh-orchestrator and its users safe.

There aren’t any published security advisories