Skip to content

Security: debugmcp/mcp-debugger

SECURITY.md

Security Policy

Supported Versions

Version Supported
0.20.x
< 0.20

Reporting a Vulnerability

Do NOT file a public GitHub issue for security vulnerabilities.

Preferred: GitHub Security Advisories

Report vulnerabilities through GitHub Security Advisories. This provides a private channel for discussion and coordinated disclosure.

Alternative: Email

Send details to debug@sycamore.llc with subject line [SECURITY] mcp-debugger: <brief description>.

What to Include

  • Description of the vulnerability
  • Steps to reproduce
  • Affected versions
  • Impact assessment (if known)

Response Timeline

  • Acknowledgment: Within 48 hours
  • Initial assessment: Within 1 week
  • Resolution target: Within 90 days

We will coordinate disclosure timing with the reporter. Credit is given to responsible reporters unless anonymity is requested.

Scope

The following components are in scope for security reports:

  • MCP server (src/) — protocol handling, tool routing, input validation
  • Language adapters (packages/adapter-*) — debug adapter lifecycle, process spawning
  • CLI bundle (packages/mcp-debugger) — command-line entry points
  • Docker image (Dockerfile) — container security, base image vulnerabilities
  • CI/CD pipelines (.github/workflows/) — supply chain integrity
  • Published packages — npm (@debugmcp/*), PyPI (debug-mcp-server-launcher), Docker Hub (debugmcp/mcp-debugger)

Out of Scope

  • Vulnerabilities in upstream debug adapters (debugpy, js-debug, CodeLLDB, Delve, netcoredbg) — report these to their respective maintainers
  • Denial of service via intentionally malformed DAP messages in a local-only deployment
  • Issues requiring physical access to the host machine
  • Reports that mcp-debugger can perform actions on the local filesystem or in spawned debuggees with the privileges of the invoking user. This is by design — see Trust Model. Path checks in get_source_context, set_breakpoint, etc. are for usability (early validation feedback), not security.
  • Reports that evaluate_expression can be used to read files, make network calls, or run arbitrary code inside the debuggee. This is the tool's intended behavior; the debuggee is already running with the user's privileges.

Trust Model

mcp-debugger is a debugger, not a sandbox. It runs as a process trusted at the level of its invoking OS user, driven by an MCP client (such as an AI agent) that the operator has chosen to trust at that same level. The trust boundary is the deployment, not the tool. This holds whether the MCP client is on the same machine over stdio or remote over SSE, and whether the debuggee is local or attached over DAP.

There are really two privilege scopes the MCP client inherits:

  • On the mcp-debugger host, the MCP client can read any file the mcp-debugger process can read (get_source_context, DAP source requests) and spawn arbitrary processes (create_debug_session + start_debugging, attach_to_process).
  • On the debuggee host (which may be a remote machine reached via attach_to_process), the MCP client can execute arbitrary code inside the debuggee (evaluate_expression, redefine_classes).

These capabilities are intrinsic to being a debugger and cannot be removed without defeating the tool's purpose. In particular, evaluate_expression forwards a caller-supplied expression to the debug adapter, which evaluates it in the debuggee's runtime; deciding whether such an expression is "safe" is undecidable in general and not a property mcp-debugger attempts to enforce.

If you want to constrain what the MCP client can reach, constrain the mcp-debugger process — and any host running a debuggee it can attach to:

  • Containers. Run the published debugmcp/mcp-debugger image with the workspace mounted at /workspace. The container boundary is the filesystem boundary.
  • OS permissions. Run mcp-debugger as a user with read access only to the source you want it to debug, and no access to secrets, SSH keys, credentials, etc. The kernel enforces the limits.
  • Network exposure. If running in SSE mode, treat the SSE port as a remote shell endpoint — anyone who can reach it inherits the mcp-debugger process's privileges. Bind to loopback or put it behind authenticated network access.
  • Remote debuggees. When using attach_to_process to debug a process on another host, the MCP client inherits that debuggee's privileges too. Apply the same containment reasoning there.
  • MCP client trust. Do not expose mcp-debugger to an MCP client that you trust less than the OS user mcp-debugger runs under.

Security Design

mcp-debugger follows these security principles:

  • Process isolation: Each debug session runs in a separate process
  • No credential storage: The server does not store or manage user credentials
  • UX-level path validation: File paths are checked for existence at request boundaries to give the MCP client immediate feedback on bad inputs. This is not an access-control mechanism — see Trust Model.
  • Least privilege: CI workflows use minimal GitHub token permissions
  • Supply chain hardening: GitHub Actions are SHA-pinned, dependencies are audited, npm packages are published with sigstore provenance

There aren't any published security advisories