If you discover a security vulnerability in BlenderMCP, please report it by emailing the maintainers or opening a private security advisory on GitHub. Do not open public issues for security vulnerabilities.
The execute_blender_code feature is powerful but potentially dangerous:
⚠️ Only use with trusted AI models and prompts- Review generated code when possible before execution
- Always save your work before executing code
- Consider disabling this feature in shared/production environments
Protect your API keys:
- Never commit API keys to version control
- Store keys in the Blender addon UI or use environment variables
- Warning: Keys entered in Blender UI may be saved in .blend files
- Don't share .blend files that contain API keys
- Rotate keys regularly
- Use different keys for development and production
- The Blender socket server binds to
localhost:9876by default - This is safe for single-user development
- For production use, consider additional authentication
- Use Docker isolation when running in untrusted environments
The tool has access to your file system through Blender's Python API:
- Only download assets from trusted sources
- Review file paths before large batch operations
- Keep the workspace isolated from sensitive data
Anonymous telemetry is enabled by default but respects your privacy:
- No personal data collected
- No prompt text collected (unless explicitly enabled)
- Only usage patterns and anonymous UUIDs
To disable telemetry:
export DISABLE_TELEMETRY=true- Regularly update dependencies
- Use
pip-auditor similar tools to scan for vulnerabilities - Pin dependency versions in production
When contributing:
- Validate all user inputs
- Sanitize file paths (prevent path traversal)
- Validate URLs before downloads
- Use allowlists for external domains
- Never commit secrets or API keys
- Use environment variables for sensitive data
- Provide
.env.examplewithout actual credentials - Document all security-relevant configuration options
- All code execution paths should be reviewed
- Pay special attention to:
- File system operations
- Network requests
- Code execution (exec, eval)
- Subprocess calls
| Version | Supported |
|---|---|
| 1.4.x | ✅ |
| < 1.4 | ❌ |
- Severity: High
- Status: By design - feature requires this capability
- Mitigation: User education, warnings in documentation
- Severity: Medium
- Status: Known limitation for ease of use
- Mitigation: Binds to localhost only, recommended for development use
- Severity: Medium
- Status: Blender limitation - properties may be saved in files
- Mitigation: User warnings, consider implementing encrypted storage
- Severity: Low
- Status: Required for functionality
- Mitigation: Only from trusted sources (PolyHaven, Sketchfab)
Before deploying to production:
- Telemetry disabled or reviewed
- API keys stored securely (not in .blend files)
- Code execution feature understood and reviewed
- Running in isolated environment (Docker recommended)
- Network access restricted to necessary services
- Blender files with embedded keys not shared
- Regular backups of important work
- Dependencies up to date
If you believe you've been affected by a security issue:
- Stop using the affected feature
- Rotate any potentially exposed API keys
- Report the issue through appropriate channels
- Review recent activity for suspicious behavior
- Update to the latest version when a fix is available
Security policies and best practices will be updated as the project evolves. Check this document regularly for updates.
Last updated: December 2025