We provide security updates for the following versions:
Version | Supported |
---|---|
1.0.x | β Yes |
< 1.0 | β No |
NetworkX MCP Server includes several built-in security features:
- All graph IDs validated against safe patterns
- File paths restricted to safe directories
- Format whitelisting for imports
- Parameter validation for all MCP tools
- 1GB memory limit to prevent DoS attacks
- Automatic cleanup of large operations
- Resource monitoring and limits
- Sandboxed file operations
- No directory traversal allowed
- Disabled dangerous formats (pickle)
- Safe temporary file handling
- Rate limiting support
- Secure error messages (no stack traces)
- No code execution (eval/exec disabled)
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report security issues responsibly:
Send security reports to: [email protected]
For sensitive reports, use our PGP key:
Key ID: [TO BE ADDED]
Fingerprint: [TO BE ADDED]
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting)
- Full paths of source file(s) related to the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Initial Response: Within 48 hours
- Investigation: Within 7 days
- Fix Development: Depends on severity
- Public Disclosure: After fix is available
When you report a vulnerability:
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Initial Assessment: We'll assess severity and impact
- Investigation: Our team will investigate the issue
- Fix Development: We'll develop and test a fix
- Coordinated Disclosure: We'll work with you on disclosure timing
- Public Disclosure: After fixes are deployed
We believe in recognizing security researchers who help keep our users safe:
Contributors who responsibly disclose security issues will be:
- Listed in our security hall of fame (with permission)
- Credited in release notes
- Thanked publicly (if desired)
While we don't currently offer monetary rewards, we're considering a bug bounty program for the future.
- Always validate input from untrusted sources
- Use the latest version of NetworkX MCP Server
- Enable Redis authentication if using persistence
- Monitor server logs for suspicious activity
- Run the server with minimal required privileges
- Use Docker containers for isolation
- Set up proper network security (firewalls, VPNs)
- Enable logging and monitoring
- Regular security updates
- Backup and recovery procedures
- Don't process sensitive data without encryption
- Be careful with graph data containing personal information
- Use secure channels for data transmission
- Implement access controls for multi-user environments
- Security scanning is included in our CI/CD pipeline
- Use
bandit
for additional security analysis - Run
safety
to check for vulnerable dependencies
- Join our Security Discussions
- Follow @NetworkXMCP for security announcements
- Initial security hardening implementation
- Input validation and sanitization
- Memory limits and resource protection
- File access restrictions
- Disabled dangerous operations
We appreciate the security research community's efforts to responsibly disclose vulnerabilities. Your work helps keep NetworkX MCP Server secure for everyone.
Contact: [email protected] PGP Key: [TO BE ADDED]
This security policy is based on security best practices and will be updated as needed.