We actively support the following versions of NCP with security updates:
Version | Supported |
---|---|
1.2.x | ✅ |
1.1.x | ✅ |
1.0.x | ❌ |
< 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security vulnerability in NCP, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by email to:
Include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Initial Response: We will provide an initial response within 7 days with next steps
- Updates: We will keep you informed of our progress throughout the process
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Credit: We will credit you in our security advisory (unless you prefer to remain anonymous)
- Vulnerability Assessment: Our team will verify and assess the impact
- Fix Development: We will develop and test a fix
- Security Advisory: We will publish a security advisory (if applicable)
- Patch Release: We will release a patched version
- Disclosure: We will coordinate disclosure timing with the reporter
This security policy applies to:
- The main NCP application
- All supported versions
- Official Docker containers
- Dependencies we directly maintain
The following are generally considered out of scope:
- Issues in third-party MCP servers (report to their maintainers)
- Vulnerabilities requiring physical access to the system
- Issues affecting only unsupported versions
- Social engineering attacks
Currently, we do not offer a paid bug bounty program. However, we deeply appreciate security researchers who help improve NCP's security and will publicly acknowledge their contributions.
If you have questions about this security policy, please contact us at [email protected].
Thank you for helping keep NCP secure!