Back to Home
Robotti-io icon

copilot-security-instructions

Verified Safe

by Robotti-io

Overview

This MCP server provides a toolkit to guide GitHub Copilot toward secure coding practices by offering customizable security-focused prompts and agents for integration into development workflows.

Installation

Run Command
npm start

Environment Variables

  • server.port
  • server.hostname
  • server.ssl
  • server.ssl.pfx
  • server.ssl.pfx.passphrase
  • logger.transports.console.enabled
  • logger.transports.console.level
  • logger.transports.amqp.enabled
  • logger.transports.amqp.level
  • logger.transports.amqp.hostname
  • logger.transports.amqp.port
  • logger.transports.amqp.username
  • logger.transports.amqp.password
  • logger.transports.amqp.exchange
  • logger.transports.amqp.vhost
  • logger.transports.amqp.heartbeat
  • logger.transports.amqp.locale
  • logger.transports.amqp.type
  • logger.transports.amqp.durable

Security Notes

The server demonstrates a strong intent for security by focusing on secure coding practices and using `zod` for input schema validation (e.g., prompt names). However, there are critical security concerns regarding default configurations and logging practices: 1) The `reqInfo` middleware captures the entire `req.body` for all requests to `/mcp` POST endpoint, which is then logged by default via `logger.info`. If sensitive data is included in JSON-RPC requests, this could lead to information leakage. 2) The `.env.example` file specifies a default `server.ssl.pfx.passphrase` of 'PFX_PASSPHRASE' and default AMQP credentials ('guest'/'guest'). Using these defaults in a production environment would be a severe security vulnerability. While the documentation notes these need customization, they represent insecure-by-default settings.

Similar Servers

Stats

Interest Score42
Security Score6
Cost ClassLow
Avg Tokens500
Stars32
Forks9
Last Update2026-01-14

Tags

SecurityAICopilotCode ReviewAppSec