Skip to content

Security: delimit-ai/delimit-mcp-server

Security

SECURITY.md

Security Policy

Supported Versions

Version Supported
3.x Yes
2.x Security fixes only
1.x No

Reporting a Vulnerability

We take security seriously at Delimit. If you discover a security vulnerability, please follow these steps:

  1. Do NOT create a public GitHub issue
  2. Email security@delimit.ai with:
    • Description of the vulnerability
    • Steps to reproduce
    • Potential impact
    • Your suggested fix (if any)

Response Timeline

  • Acknowledgment: Within 24 hours
  • Initial Assessment: Within 72 hours
  • Fix Timeline: Based on severity
    • Critical: Within 7 days
    • High: Within 14 days
    • Medium: Within 30 days
    • Low: Next release

Security Best Practices

When using Delimit:

  1. Never commit API keys or tokens to your repository
  2. Use environment variables for sensitive configuration
  3. Keep Delimit updated to the latest version
  4. Review PR annotations before merging

Supply Chain Security

  • npm provenance: All releases are published with npm provenance attestation, linking each package version to the exact GitHub commit and CI workflow that produced it
  • No install scripts: The postinstall hook only prints a setup reminder — no code execution during npm install
  • Dependency audit: All dependencies are audited for vulnerabilities before each release
  • Package contents: Only bin/, lib/, gateway/, and documentation files are included. Secrets, tests, and dev files are excluded via .npmignore
  • Publish workflow: Releases require CI validation, dependency audit, and secrets scan before publishing

Data Privacy

Delimit processes your API specifications locally. The CLI and GitHub Action do not send your specs to external servers.

There aren’t any published security advisories