DO NOT open a public GitHub issue for security vulnerabilities. Instead, please report them responsibly to:
Email: security@rethunk.tech
Response SLA: We aim to respond to security reports within 24 hours.
When reporting a vulnerability, please include:
- Description of the vulnerability
- Affected component(s) and version(s)
- Steps to reproduce (if applicable)
- Potential impact
- Suggested fix (optional)
rethunk-github-mcp is an MCP server that exposes GitHub API operations to LLMs. It has elevated security implications due to API access and batch operations.
- Critical: Server authenticates with GitHub via personal access token or app credentials
- Tokens must never be embedded in code or logs
- Environment variables (GITHUB_TOKEN) require protection
- Token scopes should be limited to minimum required operations
- High: MCP tools batch multiple API calls; potential for rapid rate limit exhaustion
- Tools like
repo_statusandecosystem_activitycan execute 10-50+ API calls per invocation - Implement rate-limit detection and backoff in client code
- Monitor for unusual token usage patterns
- Medium: Sensitive repo/org data (private repo names, CI logs, secret patterns in code) could be exposed
- All tool outputs should be treated as potentially sensitive
- Do not expose in logs or error messages
- Validate all inputs to prevent API injection attacks
- High: Tools operate across multiple repos and orgs if configured
- Ensure token scopes do not exceed intended access
- Validate repo access before returning sensitive data
- Be mindful of PR labels, commit messages, CI logs that may contain secrets
- Use GitHub Personal Access Tokens (PAT) or App credentials
- Never commit tokens; use environment variables only
- Rotate tokens regularly
- Use minimal scopes (e.g.,
repo:readfor read-only tools) - Monitor token usage via GitHub's audit log
- Validate all input parameters (repo names, branch names, etc.)
- Implement exponential backoff for rate limit 429 responses
- Set timeouts on API calls to prevent hanging
- Log API calls (without exposing tokens) for audit trails
- Do not expose raw GitHub API responses without review
- Sanitize error messages (don't expose token leakage)
- Be mindful of CI logs, commit messages that may contain secrets
- Trim log output if suspiciously long
- Keep
octokitand related GitHub API packages up-to-date - Run
bun auditregularly; address high/critical vulnerabilities - Review major version updates for API contract changes
Latest release only.
| Version | Supported |
|---|---|
| 1.0.x | ✅ Yes |
| < 1.0 |
None currently known. Reports are welcome via security@rethunk.tech.
- Octokit SDK is official GitHub SDK; generally secure but monitor updates
- Review GitHub API changelog for breaking changes and security fixes
- Be aware of GitHub's own abuse prevention and rate limiting
- Bun runtime: keep updated for security patches
- octokit/rest, octokit/graphql: official libraries, monitor for updates
- TypeScript: type safety helps prevent runtime issues
- Test tools with read-only tokens before production deployment
- Validate rate limit handling with heavy multi-repo queries
- Test error handling with invalid repos/tokens
- Do not test against production tokens; use a test token with limited access
If a security vulnerability is discovered:
- Report immediately to security@rethunk.tech (do not disclose publicly)
- Include reproduction steps and affected version(s)
- Allow 24-48 hours for initial response and triage
- Coordinate disclosure timeline if patch is required
- Credit will be given to the reporter (if desired)
- Security Issues: security@rethunk.tech
- General Support: support@rethunk.tech
- Website: https://rethunk.tech
Last updated: 2026-04-27