Excel MCP Server

Security Policy

Supported Versions

We currently support the following versions of ExcelMcp with security updates:

Version Supported
1.x.x :white_check_mark:

Reporting a Vulnerability

We take security seriously. If you discover a security vulnerability in Sbroenne.ExcelMcp, please report it responsibly.

How to Report

  1. Do NOT create a public GitHub issue for security vulnerabilities
  2. Send an email to: stefan_broenner@yahoo.com
  3. Include the following information:
    • Description of the vulnerability
    • Steps to reproduce the issue
    • Potential impact
    • Suggested fix (if you have one)

What to Expect

Security Considerations

Enhanced Security Features (Latest Version)

ExcelMcp implements comprehensive security measures:

Excel COM Automation

ExcelMcp uses Excel COM automation with security safeguards:

Power Query Privacy Levels

ExcelMcp implements security-first privacy level handling:

VBA Security Considerations

Best Practices for Users

  1. File Validation: Only run ExcelMcp on trusted Excel files
  2. VBA Source Control: Validate VBA code files before importing with script-import
  3. Network Files: Be cautious when processing files from network locations
  4. Permissions: Run ExcelMcp with minimal necessary permissions
  5. Backup: Always backup important Excel files before processing
  6. VBA Trust: Only enable VBA trust in Excel settings on systems where it’s needed (manual one-time setup)
  7. Code Review: Review VBA scripts before execution, especially from external sources
  8. Privacy Levels: Choose appropriate Power Query privacy levels based on data sensitivity (Private for sensitive data, Organizational for internal data, Public for public APIs)
  9. Environment Variables: Use EXCEL_DEFAULT_PRIVACY_LEVEL environment variable for consistent automation security

Known Limitations

Dependency Security

ExcelMcp has minimal dependencies to reduce attack surface:

Version Updates

Contact

For security-related questions or concerns, please contact Stefan Broenner through GitHub issues (for non-sensitive matters) or the security reporting method outlined above.