We actively support and provide security updates for the following versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take the security of the FGDB MCP Server seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
- Email: Send an email to the project maintainers (contact information available in the repository)
- Private Security Advisory: Use GitHub's private security advisory feature if you have access
- Direct Contact: Contact the repository maintainers directly through their GitHub profiles
When reporting a vulnerability, please include:
- Description: A clear description of the vulnerability
- Impact: The potential impact of the vulnerability
- Steps to Reproduce: Detailed steps to reproduce the issue
- Proof of Concept: If possible, include a proof of concept or exploit code (in a safe, non-destructive manner)
- Suggested Fix: If you have ideas on how to fix the issue, please share them
- Acknowledgment: You will receive an acknowledgment within 48 hours
- Initial Assessment: We will provide an initial assessment within 7 days
- Updates: We will keep you informed of our progress
- Resolution: We will work to resolve the issue as quickly as possible
- We will work with you to understand and resolve the issue quickly
- We will credit you for the discovery (unless you prefer to remain anonymous)
- We will not disclose the vulnerability publicly until a fix is available
- We will coordinate with you on the timing of public disclosure
- Keep Dependencies Updated: Regularly update your dependencies to receive security patches
- Use Environment Variables: Store sensitive configuration in environment variables, not in code
- Limit Access: Restrict access to geodatabases and use appropriate file permissions
- Monitor Logs: Regularly review logs for suspicious activity
- Validate Input: Always validate input from external sources
- Input Validation: Always validate and sanitize user input
- SQL Injection Prevention: Use parameterized queries and validate WHERE clauses
- Path Validation: Validate file paths to prevent directory traversal attacks
- Error Handling: Don't expose sensitive information in error messages
- Dependencies: Keep dependencies updated and review security advisories
- Input Validation: All user inputs are validated before processing
- SQL Injection Protection: WHERE clauses are validated to prevent SQL injection
- Path Validation: File paths are validated to prevent directory traversal
- Confirmation System: High-risk operations require explicit user confirmation
- Error Handling: Errors are logged without exposing sensitive information
- ArcPy Dependencies: The project depends on ArcPy, which is provided by ArcGIS Pro
- File System Access: The server requires file system access to geodatabases
- Network Security: When used with MCP clients, ensure secure network connections
- Authentication: The server does not provide authentication - this should be handled by the MCP client or network layer
Security updates will be:
- Released as patch versions (e.g., 0.1.1, 0.1.2)
- Documented in the release notes
- Tagged with security labels in the repository
- Announced through appropriate channels
For security-related questions or concerns, please contact the project maintainers through the methods described in the Reporting a Vulnerability section.
We thank all security researchers and contributors who help keep this project secure. Your efforts are greatly appreciated.