Security fixes are provided for the latest state of the main branch.
| Version | Supported |
|---|---|
main |
Yes |
| Older branches/tags | No |
Please report suspected vulnerabilities through GitHub's private advisory channel:
Do not open public issues for security-sensitive reports.
For non-security questions, bug reports, or feature requests, use the guidance in SUPPORT.md.
When filing a report, include:
- A clear description of the issue and impact.
- Reproduction steps or a minimal proof of concept.
- Affected versions/commit hashes.
- Any suggested remediation, if available.
Examples of issues that should be reported through the private advisory channel include:
- Credential leakage or unsafe handling of
CTX_API_KEYand related secrets. - Authentication or authorization bypass in the HTTP or WebSocket transports.
- Sensitive data exposure through logs, metrics, traces, or MCP responses.
- Contract or validation bypasses that expose unintended tools, schemas, or privileged actions.
- Dependency vulnerabilities with credible impact on the deployed server.
Maintainers will aim to:
- Acknowledge new reports within 3 business days.
- Provide a status update or triage decision within 10 business days.
- Coordinate remediation and disclosure timing with the reporter.
- Keep details private until maintainers confirm a remediation and disclosure plan.
- Avoid posting proof-of-concept exploits or sensitive traces in public issues or pull requests.
- If you are unsure whether something is security-sensitive, err on the side of private disclosure first.