Security Policy¶
Hello and thank you for your interest!
Supported versions¶
This package is at v0. Only the latest commit on main is supported for security fixes - there are no published releases yet to backport to.
| Version | Supported |
|---|---|
main (latest) |
|
| any pinned commit |
Reporting a vulnerability¶
Please disclose any vulnerabilities by emailing coilysiren@gmail.com. Expect a first response within 48 hours; follow-up cadence by email after that. This project is run on volunteer time, so please have patience
What counts as a vulnerability¶
cli-mcp projects a urfave/cli command tree as an MCP server. The execution path runs the wrapped Action in-process, so issues here become RCE one hop downstream. Specifically interested in:
- input that bypasses the JSON Schema and reaches the action with values the schema would have rejected
- subprocess argv reconstructions in
buildArgvthat produce different argv than the wrapped action would have received from a real CLI invocation - session leakage between concurrent tool calls (state from one call visible in another's output or audit)
- MCP transport bugs that surface stdio framing or HTTP request smuggling
Out of scope:
- bugs in the upstream modelcontextprotocol/go-sdk - report there
- consumer misuse (exposing destructive tools without
tool.Annotations.DestructiveHint) - that is a consumer choice