Skip to content

Security: RyanMerlin/missioncontrol

Security

SECURITY.md

Security Policy

Supported Scope

Security reports are accepted for:

  • MissionControl backend and APIs
  • MCP bridge/integration packages in this repository
  • CI/release workflow security issues

Reporting a Vulnerability

Please report privately and do not open a public issue for unpatched findings.

Contact:

Include:

  • Affected component/version/commit
  • Reproduction steps or proof-of-concept
  • Impact assessment and suggested mitigation (if known)

Response Targets

  • Initial acknowledgement: within 3 business days
  • Triage decision: within 7 business days
  • Remediation timeline: based on severity and exploitability

Disclosure

We follow coordinated disclosure. Public disclosure happens after a fix is available or mitigations are documented.

Production deployment — change the defaults

The dev docker-compose.*.yml files ship with insecure defaults suitable only for a developer's local machine:

  • POSTGRES_PASSWORD: missioncontrol (literal)
  • MC_TOKEN: dev-token (literal)
  • MQTT_PASSWORD: "" (empty)
  • CORS allow-list points at localhost

Before exposing any deployment outside a personal workstation, you MUST:

  1. Replace every literal credential with a value sourced from a secret manager (Infisical, Vault, sealed secrets, etc.) — never commit the production values.
  2. Set MC_TOKEN to a random ≥32-byte token, or migrate to OIDC and remove the static token entirely. The MC_TOKEN policy is documented in docs/plans/mc-tui-auth-spec.md as a bootstrap-only escape hatch; steady-state callers should use session tokens (mcs_*) or service-account tokens (mcs_sa_*).
  3. Configure MC_CORS_ALLOW_ORIGINS to your real frontend origin(s).
  4. Run behind TLS (reverse proxy or otherwise; do NOT set MC_ALLOW_INSECURE=true).
  5. Rotate any credential that has appeared in a screen-share, log, or chat — treat it as compromised. The dev defaults above are public; a deployment reachable from the internet that uses them is open by construction.

There aren't any published security advisories