We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take the security of Ask O11y seriously. If you discover a security vulnerability, please follow these steps:
DO NOT create a public GitHub issue for security vulnerabilities.
-
Report via GitHub Security Advisory
- Go to the Security tab of this repository
- Click "Report a vulnerability"
- Fill out the vulnerability report form with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
-
What to Include in Your Report
- Type of vulnerability (e.g., XSS, SQL injection, authentication bypass)
- Full paths of source files related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
-
What to Expect
- Initial Response: Within 48 hours, we will acknowledge receipt of your report
- Status Updates: We will keep you informed of our progress
- Validation: Within 7 days, we will validate the vulnerability
- Fix Development: We will work on a fix and keep you updated on progress
- Disclosure: Once a fix is released, we will publicly disclose the vulnerability
- 48 hours: Initial acknowledgment
- 7 days: Validation and initial assessment
- 30 days: Target for fix development and release
- 90 days: Public disclosure (coordinated with you)
When security updates are released:
- GitHub Release: Security fixes are documented in release notes
- Security Advisory: Published on GitHub Security Advisories
- Changelog: Included in CHANGELOG.md with CVE reference (if applicable)
- NPM/Plugin Registry: Updated package published
This security policy applies to:
- The Ask O11y Grafana plugin (frontend and backend)
- MCP server integrations
- Configuration and deployment examples
The following are generally not considered security vulnerabilities:
- Issues requiring physical access to a user's device
- Issues in third-party dependencies (please report to the dependency maintainer)
- Social engineering attacks
- Issues that require user to install malicious plugins or extensions
- Denial of service attacks that require significant resources
We support safe harbor for security researchers who:
- Make a good faith effort to avoid privacy violations, data destruction, and service interruption
- Only interact with accounts you own or with explicit permission from the account holder
- Do not exploit a security issue beyond what is necessary to demonstrate it
When using Ask O11y:
-
Access Control
- Limit plugin access to trusted users
- Use Grafana's role-based access control (RBAC) appropriately
- Review user permissions regularly
-
MCP Server Security
- Run MCP servers in isolated environments
- Use authentication for MCP server connections
- Encrypt MCP server communication (TLS/HTTPS)
- Regularly update MCP server dependencies
-
API Keys and Secrets
- Store API keys securely (use Grafana's provisioning or secrets management)
- Rotate credentials regularly
- Never commit secrets to version control
-
Network Security
- Deploy MCP servers in private networks when possible
- Use firewalls to restrict access
- Monitor network traffic for anomalies
-
Code Security
- Follow secure coding practices
- Validate all user inputs
- Sanitize outputs to prevent XSS
- Use prepared statements to prevent injection attacks
-
Dependency Management
- Keep dependencies up to date
- Review security advisories for dependencies
- Use
npm auditand Dependabot alerts
-
Testing
- Include security tests in your test suite
- Test with different user roles (Admin, Editor, Viewer)
- Validate RBAC enforcement
Ask O11y includes the following security features:
- Role-Based Access Control (RBAC): Tools are restricted based on Grafana user roles
- Input Validation: User inputs are validated and sanitized
- Secure Communication: MCP servers support HTTPS/TLS
- Session Management: Uses Grafana's session management
- Audit Logging: Actions are logged through Grafana's audit system
We thank the following security researchers for responsibly disclosing vulnerabilities:
- (No vulnerabilities disclosed yet)
For non-security issues, please use:
- GitHub Issues: https://github.com/Consensys/ask-o11y-plugin/issues
- GitHub Discussions: https://github.com/Consensys/ask-o11y-plugin/discussions
For security-related concerns that don't constitute a vulnerability, you can reach out via GitHub Discussions.
Last Updated: January 2026