Skip to content

Security: MissionSquad/MindbodyMCP

Security

SECURITY.md

Security Policy

Supported Versions

We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:

Version Supported
2.0.x
< 2.0

Reporting a Vulnerability

If you discover a security vulnerability within Mindbody MCP, please send an email to vinnie@vespo92.com. All security vulnerabilities will be promptly addressed.

Please do not report security vulnerabilities through public GitHub issues.

What to Include

Please include the following information in your report:

  • Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
  • Full paths of source file(s) related to the manifestation of the issue
  • The location of the affected source code (tag/branch/commit or direct URL)
  • Any special configuration required to reproduce the issue
  • Step-by-step instructions to reproduce the issue
  • Proof-of-concept or exploit code (if possible)
  • Impact of the issue, including how an attacker might exploit the issue

Response Timeline

  • Initial Response: Within 48 hours
  • Status Update: Within 5 business days
  • Resolution Timeline: Varies based on severity
    • Critical: Within 7 days
    • High: Within 14 days
    • Medium: Within 30 days
    • Low: Within 60 days

Security Best Practices

When using Mindbody MCP:

  1. Never commit credentials: Always use environment variables for API keys and passwords
  2. Use HTTPS in production: When deploying with SSE, always use SSL/TLS certificates
  3. Restrict CORS origins: In production, set specific allowed origins instead of wildcards
  4. Keep dependencies updated: Regularly update the MCP SDK and other dependencies
  5. Monitor for vulnerabilities: Use npm audit regularly
  6. Rotate credentials: Regularly rotate your Mindbody API credentials
  7. Limit permissions: Use the principle of least privilege for API access

Disclosure Policy

When we receive a security bug report, we will:

  1. Confirm the problem and determine the affected versions
  2. Audit code to find any similar problems
  3. Prepare fixes for all supported versions
  4. Release new security fix versions

Comments on this Policy

If you have suggestions on how this process could be improved, please submit a pull request.

There aren't any published security advisories