MCP-reasoner is a local-first reasoning engine that adds advanced reasoning capabilities to language models and clients that support tool use and MCP integration. This document outlines our security policy and privacy commitments.
- MCP-reasoner does not collect any data
- No analytics or telemetry
- No API keys required
- No cloud services or external connections
- All processing happens locally on your device
- MCP-reasoner runs entirely on your local machine
- No data is sent to external servers
- All thought processing and state management occurs locally
- Cache and temporary data are stored only in local memory
When using MCP-reasoner with language models or clients:
- No data is shared beyond the immediate tool interface
- Reasoning processes remain isolated to your local environment
- No persistent storage of thought chains or reasoning paths
- Memory cache is cleared upon server shutdown
-
Process Isolation
- Runs as a standalone process
- No elevated privileges required
- Isolated memory space
- No filesystem modifications outside working directory
-
Resource Management
- Configurable memory limits
- Automatic cache cleanup
- No persistent storage
- Controlled resource allocation
-
MCP Protocol
- Secure local communication via stdio
- No network ports opened
- Structured data validation
- Type-safe interfaces
-
Client Integration
- Sandboxed execution
- Limited scope of operations
- Input validation and sanitization
- Error boundary containment
-
Version Control
- Keep MCP-reasoner updated to latest version
- Monitor security advisories
- Review changelog for security-related updates
-
Integration
- Use official MCP integration methods
- Validate client configurations
- Follow security guidelines of host applications
-
Sensitive Information
- Avoid passing sensitive data through reasoning chains
- Clear cache after processing sensitive thoughts
- Use appropriate access controls in host applications
-
Local Environment
- Maintain secure host environment
- Apply system-level security patches
- Follow OS security best practices
While MCP-reasoner is designed to be secure by default through its local-first, no-data-collection approach, we still maintain security as a priority:
-
Vulnerability Reporting
- Report security concerns via GitHub issues
- Use "Security" label for security-related issues
- Provide detailed reproduction steps
-
Update Policy
- Security patches prioritized
- Backward compatibility maintained where possible
- Clear documentation of security-related changes
MCP-reasoner's local-first, no-data-collection design inherently supports compliance with various privacy regulations:
- GDPR - No personal data collection or processing
- CCPA - No data sharing or sales
- HIPAA - No health information storage or transmission
- FERPA - No educational records handling
For security concerns or privacy questions:
- Open a GitHub issue with the "Security" label
- Provide detailed information about your concern
- Allow reasonable time for response and resolution
MCP-reasoner is provided "as is" without warranty of any kind. While we strive to maintain security best practices, users are responsible for:
- Securing their local environment
- Managing sensitive data appropriately
- Following security best practices
- Keeping the software updated
- Implementing appropriate access controls
Any changes to this security policy will be:
- Documented in CHANGELOG.md
- Tagged with appropriate version
- Highlighted in release notes
- Communicated through GitHub releases