We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 2025.x | ✅ |
| < 2025 | ❌ |
We take the security of the SQLite MCP Server seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please send an email to [email protected] with the following information:
- Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
We will acknowledge receipt of your vulnerability report within 48 hours and will send a more detailed response within 72 hours indicating the next steps in handling your report.
After the initial reply to your report, we will keep you informed of the progress towards a fix and may ask for additional information or guidance.
When using the SQLite MCP Server:
- Database Security: Ensure your SQLite database files have appropriate file permissions
- Input Validation: Always validate and sanitize input data before database operations
- Connection Security: Use secure connections when accessing databases over networks
- Access Control: Implement proper authentication and authorization mechanisms
- Regular Updates: Keep the MCP server and its dependencies up to date
When we receive a security bug report, we will:
- Confirm the problem and determine the affected versions
- Audit code to find any similar problems
- Prepare fixes for all releases still under support
- Release new versions as quickly as possible
- Credit the reporter (unless they prefer to remain anonymous)
Thank you for helping keep the SQLite MCP Server and its users safe!