SpeakMCP is designed with security as a primary concern. This document outlines our security policies, vulnerability reporting procedures, and best practices for users and contributors.
- Local Storage: All user data is stored locally on the user's machine
- No Cloud Sync: No data is transmitted to external servers
- Encrypted Storage: Sensitive API keys are encrypted using electron-store
- Memory Protection: API keys are cleared from memory after use
- Secure Storage: API keys are stored using electron-safe-storage
- Access Control: Keys are only accessible to the main process
- Validation: All API keys are validated before use
- Rotation Support: Support for key rotation and revocation
- HTTPS Only: All API calls use HTTPS
- Certificate Validation: SSL certificate validation enabled
- No Proxy Bypass: Network requests cannot bypass system proxy settings
- Rate Limiting: Built-in rate limiting for API calls
- Email: security@speakmcp.com
- GitHub: Create a security advisory on our GitHub repository
- Responsible Disclosure: 90-day disclosure timeline
- Security vulnerabilities in the application
- Issues with API key handling
- Privacy concerns
- Malicious code injection possibilities
- Use Environment Variables: Store API keys in environment variables when possible
- Regular Rotation: Rotate API keys regularly
- Least Privilege: Use API keys with minimal required permissions
- Monitor Usage: Monitor API usage for unusual activity
- Keep Updated: Always use the latest version
- Verify Downloads: Verify checksums and signatures
- Secure Environment: Run in secure computing environments
- Access Control: Limit application access to necessary resources
- Security Review: All code changes undergo security review
- Static Analysis: Automated security scanning of all code
- Dependency Scanning: Regular scanning of dependencies for vulnerabilities
- Penetration Testing: Regular third-party security assessments
- Reproducible Builds: All builds are reproducible
- Code Signing: All releases are cryptographically signed
- Supply Chain: Secure supply chain management
- Integrity Checks: Build integrity verification
- Primary Contact: security@speakmcp.com
- Response Time: 24-48 hours for critical issues
- Communication: Transparent public communication about security issues
- Triage: Initial assessment within 4 hours
- Investigation: Full investigation within 24 hours
- Fix: Patch development within 7 days
- Release: Security fix release within 14 days
- SAST: Static Application Security Testing
- DAST: Dynamic Application Security Testing
- Dependency Scanning: Third-party dependency vulnerability scanning
- Container Scanning: Container image vulnerability scanning
- Penetration Testing: Quarterly third-party penetration tests
- Code Review: Security-focused code review
- Architecture Review: Regular security architecture review
- Email: security@speakmcp.com
- PGP Key: Available on keybase.io/speakmcp
- Emergency: Use GitHub security advisories for urgent issues
- Critical: 4 hours
- High: 24 hours
- Medium: 72 hours
- Low: 7 days
This security policy is licensed under CC BY-SA 4.0
Last updated: 2025-08-14