Currently, we provide security updates for the following versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
We take the security of MCPConvert seriously. If you believe you've found a security vulnerability, please follow these steps:
- Do not disclose the vulnerability publicly
- Email the project maintainers with details about the vulnerability
- You should receive a response within 48 hours
- We will work with you to understand and address the issue
- Once the vulnerability is fixed, we will coordinate the disclosure
MCPConvert is designed with the following security considerations:
- Input Validation: All Swagger/OpenAPI inputs are validated before processing
- Resource Limits: Quotas and rate limiting are implemented to prevent resource exhaustion
- No Persistent Storage: The application does not store user data beyond the current session
- HTTPS: All communications should be secured with HTTPS
When deploying MCPConvert, we recommend:
- Using HTTPS for all communications
- Implementing appropriate rate limiting at the infrastructure level
- Regularly updating dependencies to address security vulnerabilities
- Monitoring application logs for unusual activity
MCPConvert uses several third-party dependencies. We regularly monitor these for security vulnerabilities and update as necessary.