Security

A technical overview of how ApexMCP protects your data and infrastructure.

Architecture Overview

ApexMCP follows a defence-in-depth microservices architecture. No internal service is exposed directly to the internet — all traffic enters through the gateway.

Gateway

Public-facing reverse proxy. Handles auth, rate limiting, IP allowlisting, request routing, and audit logging before passing requests to internal services.

MCP Manager

Orchestrates MCP tool provisioning and execution. Builds per-org tool registries from active connectors and executes tool calls against the appropriate connector.

Credential Vault

HashiCorp Vault instance dedicated to connector credential storage. Credentials never leave the vault unencrypted; the connector service retrieves and uses them at runtime.

Audit Service

Receives audit events from all services and persists them with an immutable SHA-256 hash chain. Events are immutable once written.

Encryption

Authentication

API Security

Audit Logging

Responsible Disclosure

We welcome security researchers. If you discover a vulnerability in the ApexMCP platform, please report it to security@apexmcp.ai. Please include a description of the vulnerability, steps to reproduce, and potential impact. We aim to acknowledge reports within 2 business days and resolve critical issues within 14 days. We will not take legal action against researchers who follow responsible disclosure practices.