Your Account Security
Secure Passwords
DeployStack uses industry-standard security practices to protect your password:- Never stored in plain text: Your password is encrypted using advanced security methods
- Unique protection: Each password gets its own unique security key
- Computational protection: Even if someone accessed our database, your password would be extremely difficult to decrypt
Login Sessions
When you log into DeployStack:- Secure cookies: Your login is stored in a secure cookie that websites can’t access
- Automatic expiration: Sessions automatically expire after 30 days for security
- HTTPS protection: All login information is encrypted when traveling over the internet
- Safe logout: Logging out immediately invalidates your session
Email Verification
To ensure account security:- Verification required: New accounts must verify their email address
- Secure tokens: Verification links contain secure, time-limited tokens
- 24-hour expiration: Verification links expire after 24 hours
- One-time use: Each verification link can only be used once
- Administrator exception: The first user (administrator) is automatically verified
Data Protection
MCP Configuration Security
DeployStack automatically protects sensitive MCP configuration values through a selective encryption system: Secret Type Implementation:- Schema-Based Detection: Fields marked as
type: "secret"in MCP schemas are automatically identified for encryption - AES-256-GCM Encryption: Secret values are encrypted using the same industry-standard encryption as global settings
- Selective Processing: Only secret-type fields are encrypted; regular configuration values remain as plaintext for performance
- Encrypted Storage: Secret values are stored encrypted in the database and never saved as plaintext
- Automatic Masking: All API responses automatically mask secret values as
***** - No Secret Exposure: Secret values never appear in API responses, logs, or user interfaces
- Runtime Decryption: Only authorized operations (like satellite configuration generation) can decrypt secrets for actual use
- Template Level: Global administrators define which fields are secret types in schemas
- Team Level: Team administrators configure secret values (API keys, tokens) that all team members inherit
- User Level: Users see masked values (
*****) and cannot access actual secret content
- API keys and authentication tokens
- Database passwords and connection strings
- Service credentials and access keys
- Any configuration field marked as
type: "secret"in the schema
- Debug flags and boolean settings
- File paths and directory names
- Public configuration values
- Regular string, number, and boolean fields
- Zero Secret Exposure: Impossible for secrets to leak through API responses
- Database Protection: Even database access doesn’t reveal plaintext secrets
- Audit Safe: Logs and interfaces never contain actual secret values
- Team Security: Team members use secrets without seeing actual values
Satellite Log Masking
DeployStack satellites automatically protect sensitive values in log files and monitoring systems through selective secret masking: Automatic Secret Detection:- Backend Metadata: Control plane identifies which configuration fields contain secrets based on schema definitions
- Secret Transmission: Backend sends metadata to satellites indicating which query parameters, headers, and environment variables are secrets
- Selective Masking: Satellites mask only fields marked as secrets, leaving regular configuration visible for debugging
- Partial Visibility: First 3 characters of secret values remain visible (e.g.,
sk_*****) - Short Values: Values shorter than 3 characters are fully masked as
*** - Context Preservation: Masked logs still show which parameters were used without exposing actual values
- URL query parameters containing API keys or tokens
- HTTP headers with authentication credentials
- Environment variables marked as secret type
- Any configuration field transmitted with secret metadata
- Regular configuration values (debug flags, URLs without secrets)
- Server names and installation identifiers
- Non-sensitive query parameters and headers
- Status codes and timing information
- Log Safety: Satellite logs can be safely shared for debugging without exposing credentials
- Monitoring Protection: Log aggregation systems won’t capture plaintext secrets
- Audit Trail: Logs show which credentials were used without revealing actual values
- Incident Response: Security teams can analyze logs without credential exposure risk
Global Settings Encryption
Your global configuration data is protected with encryption:- Encrypted storage: Sensitive settings like passwords and API keys are encrypted
- Secure keys: Encryption uses industry-standard methods
- Protected access: Only authorized users can view or modify settings
Database Security
All data is protected through:- Input validation: Everything you enter is checked for security before being saved
- SQL injection protection: Database queries are automatically secured
- Proper access controls: Users can only access data they’re authorized to see
Account Access Control
User Roles
DeployStack uses role-based access to keep your installation secure:- Administrator access: Only administrators can manage users and system settings
- User isolation: Regular users can only access their own teams and projects
- Permission checking: Every action is checked against your current permissions
Team Security
Your teams and projects are protected:- Team ownership: Only team owners can modify team settings
- Member control: Team access is controlled by the team owner
- Isolated data: Teams cannot access each other’s information
Privacy
What Information We Collect
DeployStack only collects information necessary for operation:- Account information: Username, email, name (what you provide during registration)
- Team data: Team names, descriptions, and membership
- Deployment information: Information about your MCP server deployments
- System settings: Configuration you set up for email, authentication, etc.
What We Don’t Collect
- Browsing behavior: We don’t track what you do outside DeployStack
- Personal files: We don’t access files on your computer
- Third-party data: We don’t collect data from other services unless you explicitly connect them
Data Retention
- Active accounts: Data is retained while your account is active
- Deleted accounts: When you delete your account, your data is removed
- Backups: System backups may retain data for operational purposes
Best Practices for Users
Strong Passwords
- Use a unique password for DeployStack
- Consider using a password manager
- Don’t share your password with others
- Change your password if you suspect it’s been compromised
Account Security
- Log out when using shared computers
- Don’t share your account credentials
- Report suspicious activity to your administrator
- Keep your email account secure (used for password resets)
Team Management
- Only invite trusted users to your teams
- Review team membership regularly
- Use appropriate role assignments
- Remove users who no longer need access
Deployment Security
- Review MCP servers before deploying them
- Use trusted sources for MCP servers
- Keep deployment credentials secure
- Monitor your deployed services
Reporting Security Issues
If You Find a Security Problem
We appreciate responsible security reporting:- Don’t share publicly: Please don’t post security issues on public forums
- Contact us directly: Email security concerns to our team
- Provide details: Include steps to reproduce the issue if possible
- Be patient: We’ll work with you to understand and fix the issue
What We’ll Do
- Acknowledge quickly: We’ll confirm receipt of your report
- Investigate thoroughly: We’ll work to understand the issue
- Fix promptly: We’ll develop and deploy fixes as quickly as possible
- Keep you informed: We’ll update you on our progress
Getting Help
Security Questions
If you have questions about security:- Account issues: Contact your administrator
- General security: Visit our Discord community
- Suspected problems: Report them following the guidelines above
Password Problems
If you can’t log in:- Forgot password: Use the “Forgot Password” link on the login page
- Account locked: Contact your administrator
- Email issues: Ensure you can receive emails at your registered address
Privacy Concerns
If you have privacy questions:- Data access: Contact your administrator to understand what data is stored
- Data deletion: Ask your administrator about account deletion procedures
- Data export: Inquire about getting a copy of your data
Security Updates
DeployStack is regularly updated with security improvements:- Automatic updates: Security patches are applied promptly
- Dependency updates: We keep security libraries current
- Regular reviews: We continuously assess and improve security measures
Summary
DeployStack is designed with security as a core principle:- Your passwords are strongly protected with modern encryption
- Your sessions are secure and automatically protected
- Your data is encrypted when it needs to be
- Access is controlled based on roles and permissions
- Privacy is respected - we only collect what’s necessary

