We release patches for security vulnerabilities for the following versions:
我们为以下版本发布安全漏洞补丁:
| Version | Supported | 支持状态 |
|---|---|---|
| 1.x.x | ✅ | ✅ 支持 |
| < 1.0 | ❌ | ❌ 不支持 |
We take the security of Lanhu MCP Server seriously. If you believe you have found a security vulnerability, please report it to us as described below.
我们非常重视 Lanhu MCP Server 的安全性。如果您认为发现了安全漏洞,请按照以下方式向我们报告。
- Do not open a public GitHub issue for security vulnerabilities 不要为安全漏洞创建公开的 GitHub Issue
- Do not disclose the vulnerability publicly until we have had a chance to address it 不要在我们有机会解决之前公开披露漏洞
Email: dsphper@gmail.com
Please include the following information in your report:
请在报告中包含以下信息:
- Type of vulnerability: (e.g., XSS, SQL injection, authentication bypass) 漏洞类型:(例如:XSS、SQL 注入、身份验证绕过)
- Full paths of source file(s) related to the vulnerability 与漏洞相关的源文件的完整路径
- Location of the affected source code (tag/branch/commit or direct URL) 受影响源代码的位置(标签/分支/提交或直接 URL)
- Step-by-step instructions to reproduce the issue 重现问题的分步说明
- Proof-of-concept or exploit code (if possible) 概念验证或漏洞利用代码(如果可能)
- Impact of the issue, including how an attacker might exploit it 问题的影响,包括攻击者如何利用它
- Your name/handle for acknowledgment (optional) 用于致谢的您的姓名/昵称(可选)
After you submit a report, here's what will happen:
提交报告后,将发生以下情况:
- Within 48 hours: We will acknowledge receipt of your report 48 小时内:我们将确认收到您的报告
- Within 7 days: We will provide a detailed response indicating the next steps 7 天内:我们将提供详细的响应,说明后续步骤
- Regular updates: We will keep you informed about our progress 定期更新:我们将随时告知您我们的进展
- Fix and disclosure: Once the vulnerability is fixed, we will:
修复和披露:一旦漏洞修复,我们将:
- Release a security patch 发布安全补丁
- Publish a security advisory 发布安全公告
- Credit you for the discovery (if you wish) 为您的发现署名(如果您愿意)
We prefer all communications to be in English or Chinese (Simplified).
我们希望所有通信使用英语或中文(简体)。
When using Lanhu MCP Server, please follow these security best practices:
使用 Lanhu MCP Server 时,请遵循以下安全最佳实践:
- Never commit your
LANHU_COOKIEto version control 永远不要将您的LANHU_COOKIE提交到版本控制 - Store cookies securely using environment variables or secure secret management 使用环境变量或安全的密钥管理安全地存储 cookie
- Rotate cookies regularly to minimize exposure risk 定期轮换 cookie 以最小化暴露风险
- Use separate cookies for development and production environments 为开发和生产环境使用单独的 cookie
- Deploy in a trusted network or use VPN/firewall rules 部署在受信任的网络中或使用 VPN/防火墙规则
- Use HTTPS when deploying in production 在生产环境中部署时使用 HTTPS
- Limit access to the MCP server port (default: 8000) 限制对 MCP 服务器端口的访问(默认:8000)
- Consider using authentication for the MCP endpoint 考虑为 MCP 端点使用身份验证
- Secure the data directory (
./data/) which contains: 保护数据目录(./data/),其中包含:- Team messages with potentially sensitive information 可能包含敏感信息的团队消息
- Cached design files and screenshots 缓存的设计文件和截图
- Project metadata 项目元数据
- Implement backup strategies for important data 为重要数据实施备份策略
- Use encryption for sensitive data at rest 对静态敏感数据使用加密
- Implement role-based access if deploying for a team 如果为团队部署,实施基于角色的访问控制
- Monitor access logs regularly 定期监控访问日志
- Revoke access for departed team members 撤销离职团队成员的访问权限
- Keep dependencies up to date to receive security patches 保持依赖项最新以接收安全补丁
- Review dependency changes before updating 更新前审查依赖项更改
- Use virtual environments to isolate dependencies 使用虚拟环境隔离依赖项
When using Docker:
使用 Docker 时:
- Don't run as root inside containers 不要在容器内以 root 身份运行
- Scan images for vulnerabilities regularly 定期扫描镜像以查找漏洞
- Use specific version tags instead of
latest使用特定版本标签而不是latest - Limit container resources (CPU, memory) 限制容器资源(CPU、内存)
If using Feishu notifications:
如果使用飞书通知:
- Protect webhook URLs - treat them as secrets 保护 webhook URL - 将其视为密钥
- Validate webhook signatures (if available) 验证 webhook 签名(如果可用)
- Monitor for abuse of notification features 监控通知功能的滥用
This project uses Lanhu cookies for authentication. Be aware that:
本项目使用蓝湖 cookie 进行身份验证。请注意:
- Cookies can expire and need to be refreshed Cookie 可能会过期,需要刷新
- Cookies grant access to your Lanhu account Cookie 授予对您的蓝湖帐户的访问权限
- Anyone with your cookie can access your Lanhu data 任何拥有您的 cookie 的人都可以访问您的蓝湖数据
Task-type messages have security restrictions:
任务类型消息具有安全限制:
- ✅ Allowed: Read-only queries (code, database, tests) ✅ 允许:只读查询(代码、数据库、测试)
- ❌ Forbidden: Code modifications, file deletions, command execution ❌ 禁止:代码修改、文件删除、命令执行
- Message data is stored locally in JSON files 消息数据以 JSON 文件形式存储在本地
- No encryption is applied by default 默认情况下不应用加密
- Consider implementing encryption for sensitive deployments 考虑为敏感部署实施加密
We will announce security updates through:
我们将通过以下方式宣布安全更新:
- GitHub Security Advisories GitHub 安全公告
- Release notes with
[SECURITY]tag 带有[SECURITY]标签的发布说明 - Email to reporters (for disclosed vulnerabilities) 向报告者发送电子邮件(针对已披露的漏洞)
We currently do not have a formal bug bounty program. However, we deeply appreciate security researchers who responsibly disclose vulnerabilities and will:
我们目前没有正式的漏洞赏金计划。但是,我们非常感谢负责任地披露漏洞的安全研究人员,我们将:
- Publicly acknowledge your contribution (with your permission) 公开承认您的贡献(经您许可)
- List you in our security hall of fame 将您列入我们的安全名人堂
- Provide a detailed thank you in release notes 在发布说明中提供详细的感谢
For security-related questions or concerns:
有关安全相关的问题或疑虑:
- Email: dsphper@gmail.com
- Subject line:
[SECURITY] Your subject here主题行:[SECURITY] 您的主题
For general questions, please use GitHub Issues.
对于一般问题,请使用 GitHub Issues。
Last Updated / 最后更新: 2025-12-17
Thank you for helping keep Lanhu MCP Server and its users safe!
感谢您帮助保护 Lanhu MCP Server 及其用户的安全!