While using the MCP server, the application-one response contains full GitHub App secrets (private key, client secret, webhook secret). This leaks sensitive credentials into MCP responses and logs.
Example fields returned: githubPrivateKey, githubClientSecret, githubWebhookSecret.
These should never be returned to MCP clients. Please consider redacting/omitting secrets in API responses or adding a safe mode to strip them.
Impact: Any MCP client (and logs) can exfiltrate GitHub App secrets, leading to account compromise.
Request: remove/omit secret fields from responses by default, or add a server-side redaction option.
While using the MCP server, the
application-oneresponse contains full GitHub App secrets (private key, client secret, webhook secret). This leaks sensitive credentials into MCP responses and logs.Example fields returned:
githubPrivateKey,githubClientSecret,githubWebhookSecret.These should never be returned to MCP clients. Please consider redacting/omitting secrets in API responses or adding a safe mode to strip them.
Impact: Any MCP client (and logs) can exfiltrate GitHub App secrets, leading to account compromise.
Request: remove/omit secret fields from responses by default, or add a server-side redaction option.