We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We take the security of Open Stocks MCP seriously. If you discover a security vulnerability, please follow these steps:
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via one of these methods:
-
GitHub Security Advisories (Preferred)
- Navigate to the Security Advisories page
- Click "Report a vulnerability"
- Fill out the form with details about the vulnerability
-
Direct Email
- If you prefer email, contact the maintainers directly
- Include "SECURITY" in the subject line
- Provide detailed information about the vulnerability
When reporting a vulnerability, please include:
- Description: Clear description of the vulnerability
- Impact: What can an attacker accomplish?
- Reproduction: Step-by-step instructions to reproduce the issue
- Version: Which version(s) are affected
- Proof of Concept: Code, screenshots, or other evidence (if available)
- Suggested Fix: If you have ideas for how to fix it (optional)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability and determine severity
- Updates: We will keep you informed of progress toward a fix
- Disclosure: We will coordinate with you on public disclosure timing
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Release: Depends on severity and complexity
- Critical: Within 7 days
- High: Within 14 days
- Medium: Within 30 days
- Low: Next regular release
When using Open Stocks MCP:
- Environment Variables: Store all API keys and secrets in environment variables
- Never Commit: Never commit
.envfiles or credentials to version control - Rotate Regularly: Rotate API keys and passwords regularly
- Broker Credentials: Securely store Robinhood, Schwab, and other broker credentials
- OAuth Tokens: Handle OAuth tokens securely, use refresh tokens appropriately
- HTTPS Only: Always use HTTPS for API connections
- Certificate Validation: Verify SSL/TLS certificates
- Rate Limiting: Implement rate limiting to prevent abuse
- Input Validation: Validate all inputs to MCP tools
- Sensitive Data: Never log sensitive data (passwords, API keys, account numbers)
- Personal Information: Handle PII in compliance with regulations
- Financial Data: Secure storage and transmission of financial information
Security updates will be released as:
- Patch Releases: For backward-compatible security fixes (0.1.x)
- GitHub Security Advisories: Public disclosure after fix is available
- Release Notes: Detailed information in CHANGELOG.md
- CVE: We will request CVE numbers for significant vulnerabilities
For questions about this security policy or other security-related matters:
- Open a discussion in GitHub Discussions (for general questions)
- Use GitHub Security Advisories for vulnerability reports
- Check existing Security Advisories for known issues
This security policy is based on best practices from the open source community and recommendations from the GitHub Security Lab.