| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability in mcp-vanguard, please report it responsibly:
- Do NOT open a public GitHub issue
- Use GitHub's private vulnerability reporting
- Or email the maintainer directly
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial response: 48 hours
- Status update: 7 days
- Fix timeline: Depends on severity
mcp-vanguard is designed for authorized security testing only. Users are responsible for:
- Obtaining proper authorization before testing
- Staying within defined scope
- Following applicable laws and regulations
- Scope Management: Tools check targets against defined scope
- Permission Tiers: Dangerous tools require explicit confirmation
- Rate Limiting: Built-in controls to prevent abuse
- Command Allowlists: Only permitted commands can execute via executors
- Input Sanitization: Shell metacharacters and path traversal attempts are blocked
- Audit Logging: All tool calls and security events are logged
- Safe Error Handling: Sensitive data is masked in error messages
┌─────────────────────────────────────────────────────────────────┐
│ MCP Server │
├─────────────────────────────────────────────────────────────────┤
│ Input Validation │ Permission Check │ Scope Validation │
│ (sanitizer.ts) │ (config.ts) │ (config.ts) │
├─────────────────────────────────────────────────────────────────┤
│ Audit Logging (audit.ts) │
├─────────────────────────────────────────────────────────────────┤
│ Command Allowlist │ Arg Escaping │ Safe Error │
│ (executor/*.ts) │ (sanitizer.ts) │ (safe-error.ts) │
└─────────────────────────────────────────────────────────────────┘
Windows Executor (executeWindows):
- nmap, ffuf, nuclei, where, ping, tracert, nslookup, ipconfig, netstat, curl, powershell
WSL Executor (executeWSL):
- nmap, ffuf, nuclei, whois, dig, host, curl, wget, ping, traceroute, which, echo
Any command not in the allowlist will be blocked and logged as a security event.
-
Always set scope before testing:
vanguard_set_scope with targets: ["authorized-target.com"] -
Use passive tools first (SAFE tier)
-
Only use active tools (DANGEROUS tier) with authorization
-
Never use against production systems without permission
Unauthorized access to computer systems is illegal. This tool is provided for educational and authorized testing purposes only. The authors are not responsible for misuse.