Skip to content

Security: Dokploy MCP responses include GitHub App secrets (private key / client secret / webhook secret) #26

@ddwnbot

Description

@ddwnbot

While using the MCP server, the application-one response contains full GitHub App secrets (private key, client secret, webhook secret). This leaks sensitive credentials into MCP responses and logs.

Example fields returned: githubPrivateKey, githubClientSecret, githubWebhookSecret.

These should never be returned to MCP clients. Please consider redacting/omitting secrets in API responses or adding a safe mode to strip them.

Impact: Any MCP client (and logs) can exfiltrate GitHub App secrets, leading to account compromise.

Request: remove/omit secret fields from responses by default, or add a server-side redaction option.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions