Security & Transparency
At MCPHub, we believe transparency is the most important factor for security. Instead of hiding behind compliance badges, we give you complete visibility into how your data is being used.
Transparency-First Security
π Complete Request Transparency
The cornerstone of our security approach is giving you complete visibility into every interaction with MCPHub services.
Request History Logging
π MCP Request Monitoring
- β’ Every MCP server interaction logged
- β’ Complete request parameters visible
- β’ Full response data accessible
- β’ Response times and status tracking
- β’ Server-level usage analytics
π€ LLM Request Tracking
- β’ All AI model interactions logged
- β’ Token usage and cost transparency
- β’ Model selection and parameters
- β’ Session and conversation tracking
- β’ Performance metrics available
β Access Your Request History
View detailed logs of all your interactions with MCPHub services. See exactly what data was sent, what responses were received, and how your credits were used.
View Request Historyπ Authentication & Access Control
Secure Authentication
- OAuth 2.0 Integration - Secure authentication via Google and GitHub
- No password storage - We never store or handle your passwords
- JWT tokens - Secure, stateless authentication for API access
- Session management - Automatic session expiration and renewal
API Key Security
π Key Types Available
- β’ Permanent Keys - For production LLM applications
- β’ Transient Keys - 12-hour expiry for testing
- β’ Scoped Permissions - Limited to specific functions
- β’ Usage Tracking - Monitor every API call
π‘οΈ Key Management
- β’ Instant Revocation - Delete compromised keys immediately
- β’ Usage Analytics - Detect unusual activity patterns
- β’ Copy Protection - Secure key display and copying
- β’ Audit Trail - Complete history of key usage
π Data Protection & Privacy
Encryption Standards
π Data in Transit
- β’ TLS 1.3 encryption for all connections
- β’ HTTPS-only communication
- β’ Certificate pinning for API endpoints
- β’ End-to-end encryption for sensitive data
πΎ Data at Rest
- β’ AES-256 encryption for stored data
- β’ Encrypted database storage
- β’ Secure API key storage
- β’ Regular security audits
Privacy Principles
- Minimal data collection - We only collect what's necessary for service operation
- User-controlled data - You own your data and can delete it anytime
- No conversation mining - We don't analyze or store your MCP interactions for training
- Transparent logging - All data usage is visible in your request history
π Our Transparency Approach
Why We Choose Transparency Over Compliance Badges
Traditional approach: Companies display SOC 2, GDPR, ISO 27001 badges to signal trustworthiness, but these certifications often obscure what actually happens with your data.
Our approach: Instead of hiding behind compliance frameworks, we give you direct visibility into every interaction with our services through comprehensive request logging and monitoring.
What this means for you: You can see exactly what data is sent to which services, what responses you receive, and how your credits are being used - complete transparency.
π What You Can Monitor
- β’ Request Parameters - See exactly what data is sent
- β’ Response Data - View complete responses received
- β’ Credit Usage - Track how credits are consumed
- β’ Performance Metrics - Response times and success rates
- β’ Server Interactions - Which MCP servers were accessed
- β’ Error Details - Complete error information when issues occur
π οΈ Tools for Transparency
- β’ Real-time Logging - Immediate visibility into all requests
- β’ Exportable Data - Copy request/response data to clipboard
- β’ Filterable History - Search and filter by date, server, status
- β’ Detailed Analytics - Usage patterns and trends
- β’ API Access - Programmatic access to your own logs
- β’ No Hidden Processes - Every interaction is logged and visible
ποΈ Infrastructure Security
Secure by Design
π Network Security
- β’ WAF (Web Application Firewall) protection
- β’ DDoS mitigation and rate limiting
- β’ VPC isolation for sensitive operations
- β’ Regular security monitoring and alerting
βοΈ Cloud Infrastructure
- β’ Enterprise-grade cloud hosting
- β’ Multi-region deployment for reliability
- β’ Automated backup and disaster recovery
- β’ High availability architecture
MCP Server Isolation
Sandboxed Environment
All MCP servers run in isolated containers with limited permissions. They cannot access your personal data or other servers' information without explicit authorization. Every interaction is logged and visible to you.
π How Our Transparency Works
Every Request is Logged
When you interact with MCP servers or use LLM services, every request is automatically logged with complete details including parameters, responses, timing, and credit usage.
Real-Time Visibility
Access your request history in real-time through the Settings β Request History page. See what's happening with your data as it happens.
Exportable Data
Copy any request or response data to your clipboard for analysis, debugging, or record-keeping. Your data is always accessible to you.
No Hidden Processes
Unlike services that hide behind compliance frameworks, we show you exactly what happens with your data. No black boxes, no hidden processes.
π Data Protection Practices
What We Protect
- API Keys - Encrypted storage with secure access controls
- Authentication Tokens - Short-lived, automatically rotating tokens
- Request Logs - Encrypted storage with user-controlled access
- Personal Information - Minimal collection, maximum protection
What We Don't Do
β We Never:
- β’ Store your MCP server responses for training or analysis
- β’ Share your data with third parties without explicit consent
- β’ Use your conversations to improve AI models
- β’ Hide what data we collect or how we use it
- β’ Require you to trust us blindly - everything is transparent
π¨ Security Incident Response
In the unlikely event of a security incident, our transparency-first approach extends to our response:
- Immediate notification - Users are notified promptly of any security events
- Complete disclosure - Full details about what happened and what data was affected
- Transparent timeline - Clear timeline of events and our response actions
- Preventive measures - Public disclosure of steps taken to prevent future incidents
π€ Your Security Controls
ποΈ What You Control
- β’ API Key Creation - Choose permanent or transient keys
- β’ Server Selection - Choose which MCP servers to trust
- β’ Data Retention - Request deletion of your data anytime
- β’ Access Monitoring - View all access to your account
- β’ Service Usage - Enable/disable specific features
π Security Tools Available
- β’ Request History - Complete interaction logs
- β’ API Key Management - Create and manage access keys
- β’ Usage Monitoring - Track credit consumption
- β’ Account Settings - Control your profile and preferences
- β’ Data Export - Download your complete data
π¬ Questions About Security?
We're Here to Help
Have questions about our security practices? Want to understand how your data is handled? We believe in complete transparency and are happy to answer any security-related questions.