| Version | Supported |
|---|---|
| 0.1.x | ✅ Current |
Do NOT open a public GitHub issue for security vulnerabilities.
If you discover a security vulnerability in the MONEI MCP Server, please report it responsibly:
- Email: Send details to security@monei.com
- Subject:
[SECURITY] MONEI MCP Server — <brief description> - Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge your report within 48 hours and aim to provide a fix within 7 business days for critical issues.
- OAuth 2.0 with PKCE (RFC 7636) for merchant authentication
- Single-use state parameters to prevent CSRF attacks
- Scoped tokens — only
payments:read,payments:create,subscriptions:read, andaccount:read - Token refresh with automatic revocation on failure
The following operations are hard-blocked at the server level and cannot be executed through the MCP server under any circumstances:
- Refund payments
- Charge cards or Bizum
- Card or Bizum payouts
- Cancel/delete subscriptions
- Modify account settings
- Helmet.js for HTTP security headers (CSP, X-Frame-Options, HSTS, etc.)
- CORS with strict origin allowlist
- HTTPS enforcement in production with HSTS preload
- 1MB request body limit
- Content-Type validation on POST requests
- Per-account sliding-window rate limiting
- Structured audit logging for every tool invocation
- Session validation on all
/messagesrequests - Automatic session cleanup on disconnect
This security policy covers the MONEI MCP Server codebase. For vulnerabilities in the MONEI API itself, the MONEI Dashboard, or other MONEI products, please contact security@monei.com directly.