Security and Privacy
DeployStack takes security seriously. This guide explains how we protect your information and what you can do to keep your account and deployments secure.
Your Account Security
Secure Passwords
DeployStack uses industry-standard security practices to protect your password:
- Never stored in plain text: Your password is encrypted using advanced security methods
- Unique protection: Each password gets its own unique security key
- Computational protection: Even if someone accessed our database, your password would be extremely difficult to decrypt
What this means for you: Your password is safe, but you should still choose a strong, unique password.
Login Sessions
When you log into DeployStack:
- Secure cookies: Your login is stored in a secure cookie that websites can't access
- Automatic expiration: Sessions automatically expire after 30 days for security
- HTTPS protection: All login information is encrypted when traveling over the internet
- Safe logout: Logging out immediately invalidates your session
What this means for you: You can trust that your login sessions are secure and protected.
Email Verification
To ensure account security:
- Verification required: New accounts must verify their email address
- Secure tokens: Verification links contain secure, time-limited tokens
- 24-hour expiration: Verification links expire after 24 hours
- One-time use: Each verification link can only be used once
- Administrator exception: The first user (administrator) is automatically verified
What this means for you: Only you can activate your account, and verification links are secure and temporary.
Data Protection
Sensitive Settings
Your configuration data is protected with encryption:
- Encrypted storage: Sensitive settings like passwords and API keys are encrypted
- Secure keys: Encryption uses industry-standard methods
- Protected access: Only authorized users can view or modify settings
What this means for you: Your SMTP passwords, API keys, and other sensitive configuration data is securely encrypted.
Database Security
All data is protected through:
- Input validation: Everything you enter is checked for security before being saved
- SQL injection protection: Database queries are automatically secured
- Proper access controls: Users can only access data they're authorized to see
What this means for you: Your data is protected from common security attacks.
Account Access Control
User Roles
DeployStack uses role-based access to keep your installation secure:
- Administrator access: Only administrators can manage users and system settings
- User isolation: Regular users can only access their own teams and projects
- Permission checking: Every action is checked against your current permissions
What this means for you: Users only have access to features and data appropriate for their role.
Team Security
Your teams and projects are protected:
- Team ownership: Only team owners can modify team settings
- Member control: Team access is controlled by the team owner
- Isolated data: Teams cannot access each other's information
What this means for you: Your team data is private and secure from other users.
Privacy
What Information We Collect
DeployStack only collects information necessary for operation:
- Account information: Username, email, name (what you provide during registration)
- Team data: Team names, descriptions, and membership
- Deployment information: Information about your MCP server deployments
- System settings: Configuration you set up for email, authentication, etc.
What We Don't Collect
- Browsing behavior: We don't track what you do outside DeployStack
- Personal files: We don't access files on your computer
- Third-party data: We don't collect data from other services unless you explicitly connect them
Data Retention
- Active accounts: Data is retained while your account is active
- Deleted accounts: When you delete your account, your data is removed
- Backups: System backups may retain data for operational purposes
Best Practices for Users
Strong Passwords
- Use a unique password for DeployStack
- Consider using a password manager
- Don't share your password with others
- Change your password if you suspect it's been compromised
Account Security
- Log out when using shared computers
- Don't share your account credentials
- Report suspicious activity to your administrator
- Keep your email account secure (used for password resets)
Team Management
- Only invite trusted users to your teams
- Review team membership regularly
- Use appropriate role assignments
- Remove users who no longer need access
Deployment Security
- Review MCP servers before deploying them
- Use trusted sources for MCP servers
- Keep deployment credentials secure
- Monitor your deployed services
Reporting Security Issues
If You Find a Security Problem
We appreciate responsible security reporting:
- Don't share publicly: Please don't post security issues on public forums
- Contact us directly: Email security concerns to our team
- Provide details: Include steps to reproduce the issue if possible
- Be patient: We'll work with you to understand and fix the issue
What We'll Do
- Acknowledge quickly: We'll confirm receipt of your report
- Investigate thoroughly: We'll work to understand the issue
- Fix promptly: We'll develop and deploy fixes as quickly as possible
- Keep you informed: We'll update you on our progress
Getting Help
Security Questions
If you have questions about security:
- Account issues: Contact your administrator
- General security: Visit our Discord community
- Suspected problems: Report them following the guidelines above
Password Problems
If you can't log in:
- Forgot password: Use the "Forgot Password" link on the login page
- Account locked: Contact your administrator
- Email issues: Ensure you can receive emails at your registered address
Privacy Concerns
If you have privacy questions:
- Data access: Contact your administrator to understand what data is stored
- Data deletion: Ask your administrator about account deletion procedures
- Data export: Inquire about getting a copy of your data
Security Updates
DeployStack is regularly updated with security improvements:
- Automatic updates: Security patches are applied promptly
- Dependency updates: We keep security libraries current
- Regular reviews: We continuously assess and improve security measures
What this means for you: The security of DeployStack improves over time, and you benefit from ongoing security enhancements.
Summary
DeployStack is designed with security as a core principle:
- Your passwords are strongly protected with modern encryption
- Your sessions are secure and automatically protected
- Your data is encrypted when it needs to be
- Access is controlled based on roles and permissions
- Privacy is respected - we only collect what's necessary
By following security best practices and understanding how DeployStack protects your information, you can use the platform confidently for your MCP server deployments.
User Roles and Permissions
Understand user roles, permissions, and team management in DeployStack. Learn how to manage access control and collaborate effectively.
Development Guide
Complete development documentation for DeployStack - covering frontend, backend, and contribution guidelines for the MCP server deployment platform.