Skip to content

Security: adhit-r/aran-mcp

Security

SECURITY.md

Security Policy

Security Considerations

This document outlines security measures and considerations for the Aran MCP Sentinel platform.

Important Security Notes

Default Credentials

  • Default Admin User: admin@aran-mcp.com
  • Default Password: admin123
  • CRITICAL: Change these credentials immediately in production!

Environment Variables

All sensitive configuration should be provided via environment variables:

# Required Environment Variables
JWT_SECRET=your-super-secret-jwt-key-change-in-production
DB_PASSWORD=your-secure-database-password
POSTGRES_PASSWORD=your-secure-postgres-password
SUPABASE_URL=your-supabase-url
SUPABASE_KEY=your-supabase-key

Security Features

Authentication & Authorization

  • JWT-based Authentication: Secure token-based authentication
  • Role-Based Access Control (RBAC): admin, user, viewer roles
  • Password Hashing: bcrypt with salt
  • Token Expiration: 15-minute access tokens, 7-day refresh tokens
  • Audit Logging: Complete action tracking

Data Protection

  • Password Hashing: bcrypt with salt rounds
  • SQL Injection Prevention: Parameterized queries
  • XSS Protection: Input validation and sanitization
  • CSRF Protection: Token-based protection
  • Rate Limiting: Configurable request limits

Infrastructure Security

  • Environment-based Configuration: No hardcoded secrets
  • Database Security: Connection encryption support
  • Container Security: Docker best practices
  • Network Security: HTTPS support (configurable)

Security Configuration

Production Checklist

  • Change default admin password
  • Set strong JWT secret (32+ characters)
  • Use strong database passwords
  • Enable HTTPS
  • Configure proper CORS settings
  • Set up proper firewall rules
  • Enable database SSL
  • Configure rate limiting
  • Set up monitoring and alerting
  • Regular security updates

Environment Variables

# Copy and customize
cp env.example .env
cp backend/configs/config.example.yaml backend/configs/config.yaml

Reporting Security Issues

If you discover a security vulnerability, please report it responsibly:

  1. DO NOT create a public GitHub issue
  2. Email security concerns to: [security@your-domain.com]
  3. Include detailed information about the vulnerability
  4. Allow reasonable time for response before public disclosure

Security Best Practices

For Developers

  • Never commit secrets to version control
  • Use environment variables for all sensitive data
  • Implement proper input validation
  • Follow OWASP security guidelines
  • Regular dependency updates
  • Code security reviews

For Deployment

  • Use strong, unique passwords
  • Enable HTTPS in production
  • Regular security updates
  • Monitor for suspicious activity
  • Backup data regularly
  • Test disaster recovery procedures

Security Monitoring

The platform includes comprehensive security monitoring:

  • Audit Logs: All user actions tracked
  • Health Monitoring: Server status monitoring
  • Alert System: Security event notifications
  • Performance Monitoring: Response time tracking
  • Error Tracking: Comprehensive error logging

Additional Resources


Last Updated: September 21, 2024 Version: 1.0.0

There aren’t any published security advisories