Currently, only the latest version of DotNetDevMCP is supported with security updates.
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We take the security of DotNetDevMCP seriously. If you discover a security vulnerability, please follow these steps:
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities using GitHub Security Advisories:
Report: Create a Security Advisory
Alternatively, you can email the maintainer through your GitHub account or open a private issue.
Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if any)
- Initial Response: Within 48 hours, we will acknowledge receipt of your report
- Status Update: Within 7 days, we will provide an initial assessment
- Resolution: We aim to release a fix within 30 days for critical vulnerabilities
We practice coordinated disclosure:
- We will work with you to understand and validate the vulnerability
- Once a fix is ready, we will coordinate a release timeline
- We will publicly credit you for the discovery (unless you prefer to remain anonymous)
When using DotNetDevMCP:
-
Keep Dependencies Updated
- Regularly update to the latest version
- Monitor security advisories for .NET and dependencies
-
Validate Input
- Always validate and sanitize user input
- Be cautious with paths and file operations
-
Least Privilege
- Run DotNetDevMCP with minimal required permissions
- Avoid running as administrator/root unless necessary
-
Secure Configuration
- Use secure defaults
- Review configuration for security implications
- Keep sensitive data (API keys, tokens) out of source control
-
Network Security
- Use HTTPS for all network communications
- Validate SSL/TLS certificates
- Use secure authentication mechanisms
DotNetDevMCP requires file system access to:
- Read source code files
- Execute build and test commands
- Write temporary files
Mitigation: Run in sandboxed environments when processing untrusted code.
DotNetDevMCP executes:
dotnet buildcommandsdotnet testcommands- MSBuild scripts
Mitigation: Validate all inputs and use isolated build environments.
DotNetDevMCP depends on:
- .NET Runtime
- Roslyn compiler
- Third-party NuGet packages
Mitigation: Regularly update dependencies and monitor for vulnerabilities.
Security updates will be released as:
- Patch versions for non-breaking security fixes (0.1.x)
- Minor versions for breaking security fixes (0.x.0)
All security updates will be:
- Documented in the CHANGELOG
- Announced in GitHub Releases
- Tagged with
securitylabel
We recognize and thank security researchers who responsibly disclose vulnerabilities:
(No vulnerabilities reported yet)
Last Updated: December 31, 2025