| Version | Supported |
|---|---|
| 0.2.x | ✅ Current |
| < 0.2 | ❌ End of life |
If you discover a security vulnerability in MCP-Maker, please do not open a public issue.
Instead, report it privately:
- Email: mrali.hassan997@gmail.com
- Subject:
[SECURITY] MCP-Maker vulnerability report
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
You will receive a response within 48 hours acknowledging your report. We aim to release a patch within 7 days for critical issues.
The following are in scope for security reports:
- Generated server code — SQL injection, credential leaks, auth bypass
- CLI tool — command injection, path traversal, credential exposure
- Template engine — Jinja2 injection, unsafe rendering
- Connectors — credential handling, API token exposure in logs/errors
The following are out of scope:
- Vulnerabilities in upstream dependencies (report to their maintainers)
- Issues requiring physical access to the machine
- Social engineering attacks
When using MCP-Maker in production:
- Always set
DATABASE_URLvia environment variables, never in source code - Use
--auth api-keyto gate access to generated servers - Keep SSL enabled (
--no-sslis for local development only) - Review generated code before deploying to production
- Use
--ops readfor read-only access when write operations aren't needed