We actively support the following versions of SmartLead MCP Server with security updates:
Version | Supported |
---|---|
1.0.x | ✅ |
We take the security of SmartLead MCP Server seriously. If you discover a security vulnerability, please follow these steps:
Please do not create public GitHub issues for security vulnerabilities. This helps protect users who haven't yet updated to a patched version.
Send your security report to: security@leadmagic.io
Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes or mitigations
- Initial Response: Within 24 hours
- Vulnerability Assessment: Within 72 hours
- Fix Development: Depends on severity (1-14 days)
- Release: As soon as fix is ready and tested
- We will acknowledge receipt of your report within 24 hours
- We will provide regular updates on our progress
- We will notify you when the vulnerability is fixed
- We will publicly disclose the vulnerability after a fix is released
- We will credit you for the discovery (unless you prefer to remain anonymous)
-
API Key Security
- Never commit API keys to version control
- Use environment variables or secure secret management
- Rotate API keys regularly
- Limit API key permissions to minimum required
-
Environment Security
- Keep dependencies updated
- Use the latest version of SmartLead MCP Server
- Monitor for security advisories
- Use secure network connections
-
Configuration Security
- Review MCP client configurations
- Limit server access to trusted clients only
- Use proper file permissions for configuration files
- Regularly audit server logs
-
Code Security
- Follow secure coding practices
- Validate all inputs
- Use parameterized queries
- Implement proper error handling
-
Dependency Security
- Regularly update dependencies
- Use
npm audit
to check for vulnerabilities - Pin dependency versions in production
- Review dependency licenses and security policies
-
API Security
- Implement rate limiting
- Use HTTPS for all API communications
- Validate API responses
- Handle authentication errors properly
- API keys are passed as environment variables
- Ensure proper process isolation in shared environments
- Consider using secret management systems in production
- All API communications use HTTPS
- No sensitive data is logged by default
- Consider network-level security controls
- All inputs are validated using Zod schemas
- SQL injection is not applicable (REST API client)
- XSS protection through proper output encoding
Security updates will be released as patch versions and announced through:
- GitHub Security Advisories
- Release notes
- Email notifications to maintainers
For security-related questions or concerns:
- Email: support@leadmagic.io
- GitHub: Create a private security advisory
- Website: https://leadmagic.io
We appreciate the security research community and will acknowledge researchers who responsibly disclose vulnerabilities to us.