SEC EDGAR MCP follows OWASP Tallinn Secure Software Practices to ensure the security and integrity of the project. This page outlines our security practices, vulnerability reporting process, and guidelines for secure usage.

Security Practices

SEC EDGAR MCP is designed with security as a core principle, following industry best practices for open-source software development.

Code Security

Development Security

1

Code Review Required

All changes must be reviewed before merging:
  • Pull request reviews by maintainers
  • Automated security checks via GitHub Actions
  • No direct commits to main branch
2

Signed Commits Encouraged

We encourage GPG-signed commits:
# Configure git for signing
git config --global user.signingkey YOUR_KEY_ID
git config --global commit.gpgsign true
3

Security Testing

Regular security testing includes:
  • Static analysis with bandit
  • Dependency vulnerability scanning
  • Container image scanning (for Docker)

Vulnerability Reporting

Found a security vulnerability? Please report it responsibly to help us keep SEC EDGAR MCP secure for everyone.

Reporting Process

  1. Do NOT create a public GitHub issue
  2. Email security concerns to: security@[maintainer-domain].com
  3. Include:
    • Description of the vulnerability
    • Steps to reproduce
    • Potential impact
    • Suggested fix (if any)

What to Expect

Security Best Practices for Users

Environment Configuration

Run containers with minimal privileges:
# Good: Read-only container with dropped capabilities
docker run --read-only \
  --cap-drop ALL \
  --security-opt no-new-privileges \
  -e SEC_EDGAR_USER_AGENT="Your Name (your.email@domain.com)" \
  stefanoamorelli/sec-edgar-mcp:latest

# Limit resources
docker run --memory="512m" --cpus="1" \
  -e SEC_EDGAR_USER_AGENT="Your Name (your.email@domain.com)" \
  stefanoamorelli/sec-edgar-mcp:latest

Data Handling

Secure Usage Guidelines

Compliance and Privacy

GDPR Compliance

SEC EDGAR MCP:
  • Processes only publicly available SEC data
  • Does not collect personal user data
  • Does not track usage or analytics
  • Allows full data portability

SEC Terms of Use

Users must comply with SEC EDGAR terms:
  • Provide valid user agent
  • Respect rate limits
  • Use data appropriately
  • No excessive automated requests

Security Checklist

Before deploying SEC EDGAR MCP:

Reporting Security Issues

Security Contact

Report security vulnerabilities privately via email. We appreciate responsible disclosure and will credit researchers who help improve our security.

Security Updates

Stay informed about security updates:
Created and maintained by Stefano Amorelli. Built together with the community.