We actively maintain and provide security updates for the following versions:
Version | Supported |
---|---|
1.x.x | β |
< 1.0 | β |
We take the security of the SFCC Development MCP Server seriously. If you discover a security vulnerability, please follow these steps:
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by:
- GitHub Security Advisories: Use GitHub's private vulnerability reporting feature at https://github.com/taurgis/sfcc-dev-mcp/security/advisories
When reporting a vulnerability, please include:
- Description: Clear description of the vulnerability
- Impact: Potential impact and attack scenarios
- Reproduction: Step-by-step instructions to reproduce the issue
- Environment: Version, operating system, and configuration details
- Evidence: Screenshots, logs, or proof-of-concept code (if applicable)
We are committed to addressing security vulnerabilities promptly:
- Initial Response: Within 48 hours of report
- Acknowledgment: Within 7 days with initial assessment
- Resolution: Security patches released within 30 days for high-severity issues
- Disclosure: Coordinated disclosure after patch is available
This security policy covers vulnerabilities in:
- Core MCP Server: Authentication, data handling, API access
- SFCC Integration: OAuth flows, credential management, data exposure
- Documentation Access: Information disclosure, access control
- Log Analysis: Sensitive data exposure, injection vulnerabilities
- Dependencies: Third-party package vulnerabilities
- Authentication bypass in SFCC credential handling
- Sensitive data exposure in logs or responses
- Code injection through tool parameters
- Unauthorized access to SFCC instances
- Credential leakage in configuration or cache
- Path traversal in file operations
- Denial of service through resource exhaustion
- Dependency vulnerabilities with exploitable impact
- Rate limiting on local development tools
- Information disclosure of public SFCC documentation
- Resource usage in normal operation scenarios
- Configuration errors by end users
- Network connectivity issues
- Feature requests or usability improvements
-
Credential Protection:
- Store SFCC credentials securely in
dw.json
- Use environment variables for sensitive configuration
- Regularly rotate API credentials
- Never commit credentials to version control
- Store SFCC credentials securely in
-
Network Security:
- Use HTTPS connections to SFCC instances
- Verify SSL certificates in production
- Restrict network access to development instances
-
Local Security:
- Keep the MCP server updated
- Review log outputs for sensitive data
- Use proper file permissions on configuration files
-
Input Validation:
- Validate all tool parameters
- Sanitize user inputs before processing
- Use type-safe parameter parsing
-
Data Handling:
- Minimize sensitive data in logs
- Implement proper error handling
- Use secure HTTP clients with proper timeouts
-
Dependency Management:
- Regularly update dependencies
- Monitor for security advisories
- Use
npm audit
to check for vulnerabilities
- OAuth 2.0 Authentication for SFCC OCAPI access
- Secure credential storage with local file protection
- Input validation on all tool parameters
- Rate limiting on external API calls
- Secure HTTP clients with proper error handling
- Minimal privilege principle for SFCC permissions
- Dependency scanning via GitHub Dependabot
- Code quality checks in CI/CD pipeline
- Security-focused linting rules
- Regular security audits of dependencies
We believe in responsible disclosure and will work with security researchers to:
- Acknowledge your contribution
- Keep you informed of our progress
- Credit you appropriately (unless you prefer to remain anonymous)
- Coordinate timing of public disclosure
For security-related questions or concerns:
- GitHub: @taurgis
- Project: sfcc-dev-mcp
Thank you for helping keep the SFCC Development MCP Server and its users safe! π‘οΈ