We actively maintain and provide security updates for the following versions of MCP Memory Service:
| Version | Supported | Notes |
|---|---|---|
| 8.x.x | ✅ | Current stable release - full support |
| 7.x.x | ✅ | Previous stable - security fixes only |
| < 7.0 | ❌ | No longer supported |
We take the security of MCP Memory Service seriously. If you discover a security vulnerability, please report it responsibly.
For sensitive security issues, please use one of these private reporting methods:
-
GitHub Security Advisory (Preferred):
- Navigate to the Security Advisories page
- Click "Report a vulnerability"
- Provide detailed information about the vulnerability
-
Direct Contact:
- Open a GitHub Discussion with
[SECURITY]prefix for initial contact - We'll provide a secure communication channel for details
- Open a GitHub Discussion with
For non-sensitive security concerns, you may open a regular GitHub issue.
When reporting a vulnerability, please include:
- Description: Clear description of the vulnerability
- Impact: Potential security impact and affected versions
- Reproduction: Step-by-step instructions to reproduce the issue
- Environment:
- Python version
- Operating system
- Storage backend (SQLite-vec, Cloudflare, Hybrid)
- Installation method (pip, Docker, source)
- Proof of Concept: Code or commands demonstrating the vulnerability (if applicable)
- Suggested Fix: Any ideas for fixing the issue (optional)
We aim to respond to security reports according to the following timeline:
- Acknowledgment: Within 48 hours of report
- Initial Assessment: Within 5 business days
- Status Updates: Weekly until resolved
- Fix Development: 7-14 days for high-severity issues
- Patch Release: As soon as fix is validated and tested
- Public Disclosure: After patch is released (coordinated with reporter)
We use the following severity levels to prioritize security issues:
Critical 🔴
- Remote code execution
- Authentication bypass
- Data exfiltration from other users' memories
- Complete system compromise
High 🟠
- Privilege escalation
- SQL injection
- Cross-site scripting (XSS) in dashboard
- Denial of service affecting all users
Medium 🟡
- Information disclosure (limited scope)
- Cross-site request forgery (CSRF)
- Local file access vulnerabilities
- Resource exhaustion (single user)
Low 🟢
- Timing attacks
- Security configuration issues
- Low-impact information leaks
- Keep Updated: Always use the latest stable version
- Secure Configuration:
- Use strong API keys (
openssl rand -base64 32) - Enable HTTPS for HTTP server mode
- Restrict network access to localhost unless needed
- Use strong API keys (
- Credential Management:
- Never commit
.envfiles with credentials - Use environment variables for sensitive data
- Rotate Cloudflare API tokens regularly
- Never commit
- Authentication: Enable OAuth 2.1 for multi-user deployments
- Monitoring: Review logs for suspicious activity
- Backups: Regularly backup your memory database
- Dependency Security:
- Review dependency updates for known vulnerabilities
- Use
pip-auditto scan for security issues - Keep dependencies up to date
- Input Validation:
- Sanitize all user input
- Use parameterized queries (no string concatenation)
- Validate file uploads and document ingestion
- Authentication & Authorization:
- Use secure session management
- Implement proper access controls
- Follow OAuth 2.1 security best practices
- Sensitive Data:
- Never log API keys, tokens, or passwords
- Encrypt sensitive data at rest (user responsibility)
- Use secure random number generation
- Code Review: All PRs must pass security review before merge
- Local File Access: Database file should have appropriate permissions (600)
- Concurrent Access: Use proper locking to prevent corruption
- Backup Encryption: User responsibility to encrypt backups
- API Token Security: Tokens have full account access - guard carefully
- Rate Limiting: Cloudflare enforces rate limits (10k requests/min)
- Data Residency: Data stored in Cloudflare's network per your account settings
- Synchronization: Ensure secure sync between local and cloud storage
- Credential Exposure: Both SQLite and Cloudflare credentials needed
- HTTPS Recommended: Use HTTPS in production environments
- XSS Protection: All user input is escaped before rendering
- CSRF Protection: Implement for state-changing operations
- Session Security: Enable secure cookies in production
- Local Access Only: MCP server typically runs locally via stdin/stdout
- Process Isolation: Each client gets isolated server process
- No Network Exposure: By default, MCP mode has no network attack surface
Security patches are released as:
- Patch versions (8.x.Y) for low/medium severity
- Minor versions (8.X.0) for high severity requiring API changes
- Out-of-band releases for critical vulnerabilities
Security advisories are published at:
- GitHub Security Advisories
- CHANGELOG.md with
[SECURITY]tag - Release notes for affected versions
We follow coordinated disclosure:
- Vulnerability reported privately
- We confirm and develop a fix
- Security advisory drafted (private)
- Patch released with security note
- Public disclosure 7 days after patch release
- Reporter credited (if desired)
We appreciate security researchers following responsible disclosure practices and will acknowledge contributors in our security advisories.
We recognize security researchers who help make MCP Memory Service more secure:
No security vulnerabilities have been publicly disclosed to date.
For security concerns that don't fit the above categories:
- General Security Questions: GitHub Discussions
- Project Security: See reporting instructions above
Last Updated: November 2025 Policy Version: 1.0