Skip to content

Security Policy

Hello and thank you for your interest! 🎉 🔒

Supported versions

This package is at v0. Only the latest commit on main is supported for security fixes - there are no published releases yet to backport to.

Version Supported
main (latest) ✅
any pinned commit ❌ (upgrade)

Reporting a vulnerability

Please disclose any vulnerabilities by emailing coilysiren@gmail.com. Expect a first response within 48 hours; follow-up cadence by email after that. This project is run on volunteer time, so please have patience 🙇

What counts as a vulnerability

cli-mcp projects a urfave/cli command tree as an MCP server. The execution path runs the wrapped Action in-process, so issues here become RCE one hop downstream. Specifically interested in:

  • input that bypasses the JSON Schema and reaches the action with values the schema would have rejected
  • subprocess argv reconstructions in buildArgv that produce different argv than the wrapped action would have received from a real CLI invocation
  • session leakage between concurrent tool calls (state from one call visible in another's output or audit)
  • MCP transport bugs that surface stdio framing or HTTP request smuggling

Out of scope:

  • bugs in the upstream modelcontextprotocol/go-sdk - report there
  • consumer misuse (exposing destructive tools without tool.Annotations.DestructiveHint) - that is a consumer choice