August 26, 2025 Update: Major Security and System Improvements

This release significantly enhances DeployStack's security and reliability with automatic credential encryption and improved internal architecture. We've eliminated the most common security risk in AI tool configurations while making the system more robust for future growth.

Security Field Implementation

What We Changed

1. MCP Configuration Fields Now Encrypt Automatically

We added a type: "secret" field type to MCP server schemas. When global admins mark a field as secret:

  • Field values are encrypted with AES-256-GCM before database storage
  • API responses return ***** instead of the actual value
  • Runtime still gets the decrypted value for MCP server execution

Before: API keys stored as plain text in the database, visible in API responses After: API keys encrypted in database, masked in API responses, decrypted only for runtime

Example:

// Schema definition
{
"apiKey": {
"type": "secret",
"description": "Your API key"
}
}

When you configure apiKey: "sk-1234567890", it gets encrypted and you see ***** everywhere except when the MCP server actually runs.

2. Fixed MCP Configuration Data Structure

We standardized how MCP configurations are stored internally across all three tiers (template/team/user):

  • All configuration data now uses the same internal format
  • Better handling of the args/env merging process
  • More consistent behavior when assembling final runtime configurations

Before: Inconsistent data structures caused edge cases in configuration assembly After: Consistent data handling, more reliable configuration merging

Technical Impact

Secret Type Implementation:

  • Affects: All MCP server configurations with sensitive fields
  • Breaking: No - existing configs work the same
  • Security: High - eliminates credential exposure in APIs/logs

Data Structure Consistency:

  • Affects: Internal configuration processing
  • Breaking: No - user experience unchanged
  • Reliability: Improved configuration assembly and error handling

August 26, 2025 Update Summary

Release Date: August 26, 2025

What We Changed

1. MCP Configuration Fields Now Encrypt Automatically

We added a type: "secret" field type to MCP server schemas. When global admins mark a field as secret:

  • Field values are encrypted with AES-256-GCM before database storage
  • API responses return ***** instead of the actual value
  • Runtime still gets the decrypted value for MCP server execution

Before: API keys stored as plain text in the database, visible in API responses After: API keys encrypted in database, masked in API responses, decrypted only for runtime

Example:

// Schema definition
{
"apiKey": {
"type": "secret",
"description": "Your API key"
}
}

When you configure apiKey: "sk-1234567890", it gets encrypted and you see ***** everywhere except when the MCP server actually runs.

2. Fixed MCP Configuration Data Structure

We standardized how MCP configurations are stored internally across all three tiers (template/team/user):

  • All configuration data now uses the same internal format
  • Better handling of the args/env merging process
  • More consistent behavior when assembling final runtime configurations

Before: Inconsistent data structures caused edge cases in configuration assembly After: Consistent data handling, more reliable configuration merging

Technical Impact

Secret Type Implementation:

  • Affects: All MCP server configurations with sensitive fields
  • Breaking: No - existing configs work the same
  • Security: High - eliminates credential exposure in APIs/logs

Data Structure Consistency:

  • Affects: Internal configuration processing
  • Breaking: No - user experience unchanged
  • Reliability: Improved configuration assembly and error handling

What You Need to Do

Nothing. Both changes are backward compatible and happen automatically.

Nothing. Both changes are backward compatible and happen automatically.

Share: