We take the security of Hypertool MCP seriously. If you discover a security vulnerability, please report it responsibly.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please email us at: support@onegrep.dev
Include the following information:
- Type of issue (e.g., buffer overflow, command injection, privilege escalation, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- We will acknowledge your email within 48 hours
- We will provide a detailed response within 7 days indicating our next steps
- We will keep you informed of progress towards fixing the issue
- We may ask for additional information or guidance
When using Hypertool MCP:
- Authentication: Ensure proper authentication for all underlying MCP servers
- Environment Variables: Store sensitive tokens and API keys in environment variables, never in code
- Configuration Security:
- Protect your
.mcp.json
configuration files - Use appropriate file permissions
- Never commit sensitive configuration to version control
- Protect your
- Network Security:
- Use secure transports when available
- Be cautious when exposing HTTP endpoints
- Tool Permissions:
- Only enable tools you trust
- Regularly audit enabled toolsets
- Use the principle of least privilege
- Regular Updates: Keep the package updated to the latest version for security patches
- Tool Isolation: Each tool call is routed to the appropriate server without cross-contamination
- Input Validation: All tool calls are validated before routing
- Error Handling: Errors from underlying servers are handled gracefully without exposing sensitive information
- Connection Security: Each underlying MCP server connection is isolated
- Configuration Validation: All configuration files are validated against strict schemas
We provide security updates for the following versions:
Version | Supported |
---|---|
0.0.x | ✅ Yes |
< 0.0 | ❌ No |
- Insecure Mode: The
--insecure
flag bypasses tool hash verification. Use only in development environments. - HTTP Transport: When using HTTP transport, ensure proper network isolation or use HTTPS proxies.
- Tool Permissions: Hypertool inherits the permissions of the underlying MCP servers it connects to.
We appreciate the security research community and will acknowledge security researchers who responsibly disclose vulnerabilities.