Skip to content

Security: GavinLucas/docker-mcp

SECURITY.md

Security Policy

Reporting a vulnerability

If you believe you have found a security issue in docker-mcp, please open a private vulnerability report via GitHub's security advisory flow rather than filing a public issue. That keeps the discussion private until a fix is available.

Threat model and operational risks

The trust boundary, credential-handling guidance, and known risks (privileged containers, host bind mounts, exec_in_container, compose_exec / compose_run, container archive paths, destructive operations, the CLI shell-out attack surface, and Docker context retargeting) are documented in README.md → Security considerations. Read that section before connecting an AI agent to this server.

In short: the Docker daemon's socket is effectively root-equivalent on its host, and this server exposes the full Docker SDK surface plus selected docker CLI features (Compose, Context) and direct registry HTTPS access. There is no per-tool authorization layer — the daemon (and, for CLI-backed tools, the host running this server) is the trust boundary. Treat the agent as a privileged user, and prefer pointing DOCKER_HOST at a scoped daemon (development VM, remote sandbox, Docker Desktop, rootless install) rather than a production socket.

There aren't any published security advisories