Skip to content

fix: restrict MCP config permissions to protect API keys#4

Draft
cursor[bot] wants to merge 1 commit intomainfrom
cursor/critical-bug-inspection-4ffa
Draft

fix: restrict MCP config permissions to protect API keys#4
cursor[bot] wants to merge 1 commit intomainfrom
cursor/critical-bug-inspection-4ffa

Conversation

@cursor
Copy link

@cursor cursor bot commented Mar 12, 2026

Setup currently writes Pixelmuse API keys into editor MCP config files with default filesystem permissions, which can expose credentials to other local users on shared systems. This hardens writes to owner-only permissions and adds tests covering creation and hardening of existing permissive files.

Open in Web View Automation 

Co-authored-by: Dylan Boudro <starmorph@users.noreply.github.com>
@starmorph
Copy link
Owner

@copilot please fix the security audit failing CI on this PR and commit it to the PR

Copy link

Copilot AI commented Mar 12, 2026

@starmorph I've opened a new pull request, #5, to work on those changes. Once the pull request is ready, I'll request review from you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants