| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability, please follow these steps:
- DO NOT open a public issue
- Email security concerns to: [maintainer-email]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
When using Telegram MCP Server:
-
Environment Variables
- Never commit
.envfiles - Use secure methods to manage secrets
- Rotate tokens regularly
- Never commit
-
Authentication
- Always configure
TELEGRAM_CHAT_ID - Use strong, unique bot tokens
- Monitor for unauthorized access attempts
- Always configure
-
Deployment
- Run in isolated environments
- Use HTTPS for all communications
- Keep dependencies updated
- Enable logging for audit trails
-
Rate Limiting
- Implement rate limiting in production
- Monitor for abuse patterns
- Set appropriate timeouts
- Initial response: Within 48 hours
- Status update: Within 1 week
- Fix deployment: Based on severity
Thank you for helping keep Telegram MCP Server secure!