Back to Home

Security Policy

Last updated: February 22, 2026

1. Data Encryption

MCPist protects your sensitive information through the following measures:

  • External service access tokens and OAuth credentials are encrypted with AES-256-GCM at rest
  • All communications are encrypted via TLS 1.2 or higher
  • Database connections are secured with SSL/TLS

2. Authentication & Authorization

We employ multi-layered authentication and authorization mechanisms:

  • User authentication via Clerk with secure session management
  • API keys are issued as Ed25519-signed JWTs (mpt_ prefix)
  • Worker-to-Server communication uses short-lived (30s) Gateway JWTs
  • Per-module and per-tool access control with daily usage limits

3. Infrastructure

The service operates on the following infrastructure:

  • API Gateway: Cloudflare Workers (built-in DDoS protection and WAF)
  • Backend: Render.com managed services
  • Database: Supabase PostgreSQL (RLS, automatic backups)
  • DNS/CDN: Cloudflare (DNSSEC enabled)

4. Vulnerability Reporting

If you discover a security vulnerability, please report it through the following channels. We appreciate responsible disclosure and will respond appropriately.

  • Please use the Security Advisory feature on our GitHub repository
  • To allow us time to address the issue before public disclosure, please submit vulnerability details privately

5. Logging & Monitoring

We maintain the following monitoring practices to ensure service security:

  • API request access logging
  • Anomalous access pattern detection
  • Periodic health checks for service availability monitoring

6. Contact

For security-related inquiries, please contact us via GitHub Issues or the Security Advisory feature on our repository.