UNPKG

leadmagic-mcp-server

Version:

Model Context Protocol server for LeadMagic API - Complete B2B data enrichment with 19 tools for email finding, profile enrichment, company intelligence, job data, and advertisement tracking

229 lines (166 loc) 6.47 kB
# 🔒 Security Policy ## 🛡️ Supported Versions We actively maintain and provide security updates for the following versions: | Version | Supported | Status | | ------- | ------------------ | ------ | | 1.0.x | ✅ Yes | Active | | < 1.0 | ❌ No | Deprecated | ## 🚨 Reporting a Vulnerability **Please do not report security vulnerabilities through public GitHub issues.** ### 📧 Private Reporting Send security issues directly to: **security@leadmagic.io** Include the following information: - **📋 Description** of the vulnerability - **🔄 Steps to reproduce** the issue - **📊 Impact assessment** (who/what is affected) - **🛠️ Suggested fix** (if you have one) - **🔗 Related files/code** sections - **📧 Your contact information** ### ⏰ Response Timeline - **24 hours**: Initial acknowledgment - **72 hours**: Initial assessment and severity classification - **7 days**: Detailed response with remediation plan - **30 days**: Target resolution for high/critical issues ### 🏆 Security Recognition We appreciate responsible disclosure and will: - **📝 Credit you** in our security advisories (if desired) - **🎁 Provide LeadMagic credits** for valid vulnerabilities - **🏆 Recognition** in our hall of fame ## 🔐 Security Best Practices ### 🔑 API Key Security **✅ Do:** - Store API keys in environment variables - Use `.env` files for local development (never commit them) - Rotate API keys regularly - Use separate keys for different environments - Monitor API key usage in your dashboard **❌ Don't:** - Hardcode API keys in source code - Share API keys in chat/email - Commit `.env` files to version control - Use production keys in development - Log API keys in application logs ### 🌐 Network Security **✅ Recommended:** - Use HTTPS for all API communications - Implement request timeout limits - Use firewall rules to restrict outbound connections - Monitor API usage and rate limits - Implement proper error handling to avoid information leakage ### 📱 Client-Side Security **✅ MCP Client Security:** - Never expose API keys to client-side code - Run MCP server in secure environments only - Use least-privilege access principles - Regularly update MCP client applications - Monitor MCP server logs for suspicious activity ### 🔧 Configuration Security **✅ Secure Configuration:** ```bash # ✅ Good - Environment variable export LEADMAGIC_API_KEY="your-secure-api-key" # ✅ Good - .env file (not committed) LEADMAGIC_API_KEY=your-secure-api-key # ❌ Bad - Hardcoded in code const apiKey = "lm_1234567890abcdef"; // NEVER DO THIS ``` ## 🔍 Security Features ### 🛡️ Built-in Security **Input Validation:** - All inputs validated with Zod schemas - Type-safe TypeScript implementation - Sanitized error messages - Request size limits **Network Security:** - HTTPS-only API communication - Configurable timeout settings - Automatic retry with exponential backoff - User-agent identification **Error Handling:** - No sensitive data in error messages - Sanitized stack traces - Proper HTTP status codes - Logged security events ### 🔐 Data Protection **Data Handling:** - No persistent storage of sensitive data - Minimal data retention - Secure API communication - GDPR compliance considerations **Privacy:** - No personal data logging - Configurable debug levels - Optional request/response logging - Data minimization principles ## 🚫 Known Security Considerations ### ⚠️ Environment Variables **Risk**: API keys in environment variables can be accessed by any process **Mitigation**: - Use secure environment variable management - Restrict process access permissions - Monitor environment variable access ### ⚠️ Network Interception **Risk**: API requests could be intercepted **Mitigation**: - Always use HTTPS (enforced by default) - Implement certificate pinning if needed - Use VPN for sensitive environments ### ⚠️ Rate Limiting **Risk**: API abuse or DoS attacks **Mitigation**: - Built-in rate limiting respect - Configurable timeout settings - Monitor API usage patterns ## 📋 Security Checklist ### 🔧 For Developers - [ ] API keys stored securely (environment variables) - [ ] No sensitive data in logs - [ ] Input validation implemented - [ ] Error handling doesn't leak information - [ ] Dependencies regularly updated - [ ] Security tests included ### 🛠️ For Deployment - [ ] Secure environment configuration - [ ] Network access properly restricted - [ ] Monitoring and alerting configured - [ ] Regular security updates applied - [ ] Access logs monitored - [ ] Backup and recovery plans tested ### 👥 For Users - [ ] API keys rotated regularly - [ ] Usage monitored in dashboard - [ ] Secure development environment - [ ] Latest version installed - [ ] Security advisories subscribed ## 🚨 Incident Response ### 📞 If You Suspect a Security Issue 1. **🛑 Stop**: Don't continue using potentially compromised systems 2. **🔒 Secure**: Rotate API keys immediately 3. **📧 Report**: Contact security@leadmagic.io 4. **📋 Document**: Save logs and evidence 5. **⏰ Monitor**: Watch for unusual activity ### 🔄 Our Response Process 1. **📧 Acknowledgment**: We'll confirm receipt within 24 hours 2. **🔍 Investigation**: Assess impact and scope 3. **🛠️ Mitigation**: Implement immediate fixes 4. **📢 Communication**: Update affected users 5. **📝 Post-mortem**: Document lessons learned ## 📚 Security Resources ### 📖 Documentation - [LeadMagic Security Center](https://leadmagic.io/security) - [API Security Best Practices](https://docs.leadmagic.io/security) - [MCP Security Guidelines](https://modelcontextprotocol.io/security) ### 🛠️ Tools - [API Key Management](https://app.leadmagic.io/dashboard/api-keys) - [Usage Monitoring](https://app.leadmagic.io/dashboard/usage) - [Security Alerts](https://app.leadmagic.io/dashboard/security) ### 📧 Contact - **🚨 Security Issues**: security@leadmagic.io - **💬 General Support**: support@leadmagic.io - **💬 Community**: [Discord](https://discord.gg/leadmagic) ## 🔄 Updates This security policy is reviewed and updated regularly. Check back for the latest security guidance and best practices. **Last Updated**: January 27, 2025 **Version**: 1.0.0 --- **🛡️ Security is a shared responsibility. Thank you for helping keep LeadMagic MCP Server secure!**