The following versions of Tech Conference MCP Server are currently supported with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take the security of Tech Conference MCP Server seriously. If you discover a security vulnerability, please follow these steps:
Please do not create a public GitHub issue for security vulnerabilities. This helps protect users while we work on a fix.
The preferred method for reporting vulnerabilities is through GitHub's Security Advisory feature:
- Navigate to the repository's Security tab
- Click Report a vulnerability
- Fill out the advisory form with details
If you cannot use GitHub Security Advisories, please email the project maintainers with:
- Subject: "Security Vulnerability Report - Tech Conference MCP"
- Details: Description of the vulnerability, steps to reproduce, and potential impact
A good security report should include:
- Type of vulnerability (e.g., SQL injection, authentication bypass, data exposure)
- Affected component(s) (e.g., database queries, MCP tool handlers, data sync)
- Steps to reproduce the vulnerability
- Potential impact (e.g., data breach, unauthorized access, denial of service)
- Suggested fix (if you have one)
- Your contact information for follow-up questions
Type: SQL Injection
Component: ConferenceQueries.searchSessions()
Swift Version: 6.2
Platform: macOS 15.0
Description:
The searchSessions() method may be vulnerable to SQL injection when
user-provided search queries are not properly sanitized.
Steps to Reproduce:
1. Call search_sessions tool with query: "'; DROP TABLE session; --"
2. Observe database behavior
Impact:
Potential for unauthorized database manipulation or data exfiltration.
Suggested Fix:
Use parameterized queries with StatementArguments for all user inputs.
- Initial Response: Within 48 hours of receiving your report
- Triage: Within 1 week, we will confirm the vulnerability and assess severity
- Fix Development: Depends on severity (critical: 1-2 weeks, high: 2-4 weeks)
- Disclosure: Coordinated disclosure after fix is released
- Assessment: Evaluate severity using CVSS scoring
- Development: Create a fix in a private branch
- Testing: Comprehensive testing of the security patch
- Release: Publish patched version to GitHub and notify users
- Advisory: Publish security advisory with details and mitigation steps
-
File Permissions: Ensure your conference database has appropriate file permissions:
chmod 600 ~/.tech-conf-mcp/conferences.db -
Backup: Regularly backup your conference data:
cp ~/.tech-conf-mcp/conferences.db ~/.tech-conf-mcp/backups/conferences-$(date +%Y%m%d).db
- Local Settings: Never commit
.claude/settings.local.jsonto version control - API Keys: If adding external sync features, use environment variables for API keys
- File Paths: Use absolute paths and avoid exposing sensitive directory structures
-
Minimal Permissions: Run the MCP server with minimal required permissions
-
Logging: Review logs regularly for suspicious activity:
tech-conf-mcp --log-level info 2>&1 | tee tech-conf.log
-
Updates: Keep the server updated to the latest version:
swift package update swift package experimental-install
- Local-Only Data: Currently, all data is stored locally in SQLite. No remote sync is implemented.
- No Authentication: The MCP server assumes trusted communication with Claude Desktop via stdio.
- No Input Validation: User queries are passed through with minimal sanitization (mitigated by parameterized queries).
- Input validation and sanitization for all tool parameters
- Rate limiting for tool calls to prevent abuse
- Audit logging for all database operations
- Encrypted database storage option
- OAuth integration for external data sync (TechConfSync module)
Once a security issue is resolved:
- Fixed Version: We release a patched version immediately
- Security Advisory: Publish details in GitHub Security Advisories
- Credit: Security researchers who report vulnerabilities responsibly will be credited (if desired)
- Notification: Users are notified via GitHub releases and README updates
If you have questions about this security policy, please open a GitHub issue with the label security-question (for non-sensitive questions) or contact the maintainers directly.
Last Updated: 2025-10-03 Policy Version: 1.0