We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 0.x.x | ✅ |
We take the security of VibeMCP seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Report privately: Use GitHub Security Advisories to report vulnerabilities privately
- Email us: Send details to info@vibetensor.com
- Provide details: Include steps to reproduce, potential impact, and suggested fixes if any
- Give us time: Allow reasonable time for us to address the issue before public disclosure
- Don't open public issues for security vulnerabilities
- Don't exploit the vulnerability beyond what's necessary to demonstrate it
- Don't access other users' data or accounts
- Don't perform denial of service attacks
When reporting a vulnerability, please include:
- Description of the vulnerability
- Steps to reproduce the issue
- Affected versions of VibeMCP
- Potential impact (what could an attacker do?)
- Suggested fix (if you have one)
- Your contact information for follow-up questions
- Initial Response: Within 48 hours
- Status Update: Within 5 business days
- Fix Timeline: Depends on severity
- Critical: 24-72 hours
- High: 1-2 weeks
- Medium: 2-4 weeks
- Low: Next release cycle
VibeMCP runs entirely on your local machine. There is no VibeTensor-hosted backend, no telemetry, and no data transmission to third parties.
- Google: Standard OAuth 2.0 with localhost redirect (
http://localhost:4100/code). Users create their own Google Cloud OAuth client - Microsoft: MSAL Device Code Flow. Users create their own Azure App Registration
- Per-account isolated token storage (one file per account)
- Automatic token refresh via googleapis and MSAL libraries
- OAuth tokens stored as local JSON files in the project directory
- Google tokens:
.oauth2.{email}.json - Microsoft tokens:
~/.vibemcp-ms-cache.json(MSAL persistent cache) - Account registry:
accounts.json - All credential files are excluded from git via
.gitignore
- All tool parameters validated using Zod schemas
- Type coercion for MCP protocol compatibility
- No shell command execution from user input
- No dynamic code evaluation
- VibeMCP is a passthrough: it fetches data from Google/Microsoft APIs and returns it to the MCP client
- No persistent data storage beyond auth tokens
- No caching of email content or calendar data
- stderr-safe logging ensures no sensitive data leaks to stdout (which carries MCP JSON-RPC messages)
- OAuth tokens are never included in MCP tool responses
- Tokens are never logged (console.log redirected to stderr, and token values are not logged)
- Service instances are cached in-memory with 10-minute TTL (tokens stay in memory only while the process runs)
As documented in MCP security research:
- Tool Poisoning: VibeMCP uses a curated, verified tool set (31 tools, all defined in source)
- Token Leakage: OAuth tokens are never exposed in tool responses
- Command Injection: No shell command execution from user input
OAuth token files are created with default file permissions. On shared systems, users should ensure these files are readable only by their user account:
# Linux/macOS
chmod 600 .oauth2.*.json
chmod 600 accounts.json- Dependencies are regularly updated via Dependabot
- Key runtime dependencies:
googleapis,@azure/msal-node,@modelcontextprotocol/sdk,zod - Security advisories are monitored
The following files contain sensitive credentials and are excluded by .gitignore:
| File Pattern | Contents |
|---|---|
.env |
Google/Microsoft API credentials |
.oauth2.*.json |
Google OAuth access + refresh tokens |
.vibemcp-ms-cache.json |
Microsoft MSAL token cache |
accounts.json |
Registered account emails |
If you accidentally commit any of these files:
- Immediately revoke the exposed credentials
- Remove the file from git history (
git filter-branchorBFG Repo-Cleaner) - Rotate all affected API keys and tokens
We thank the following researchers for responsibly disclosing vulnerabilities:
No vulnerabilities reported yet.
- Security Email: info@vibetensor.com
- GitHub Security Advisories: Report here
Thank you for helping keep VibeMCP and our users safe!