Skip to content

Range verification and vulnerability scan improvements#84

Merged
anirbanbasu merged 8 commits into
masterfrom
83-improve-vulnerability-rating-further-and-fix-rate-limiter-configuration
Jan 15, 2026
Merged

Range verification and vulnerability scan improvements#84
anirbanbasu merged 8 commits into
masterfrom
83-improve-vulnerability-rating-further-and-fix-rate-limiter-configuration

Conversation

@anirbanbasu
Copy link
Copy Markdown
Owner

@anirbanbasu anirbanbasu commented Jan 14, 2026

  • Added ranges for multiple environment variables, thus limiting specifications of invalid values.
  • Removed UVICORN_LIMIT_MAX_REQUESTS in the view of allowing the server to run forever on hosted environments such as FastMCP cloud.
  • Vulnerability scan improvements done.

Fixes #83

…specifications of invalid values.

feat: Removed UVICORN_LIMIT_MAX_REQUESTS in the view of allowing the server to run forever on hosted environments such as FastMCP cloud.
@anirbanbasu anirbanbasu self-assigned this Jan 14, 2026
@anirbanbasu anirbanbasu added the enhancement New feature or request label Jan 14, 2026
@anirbanbasu anirbanbasu marked this pull request as ready for review January 15, 2026 13:10
Copilot AI review requested due to automatic review settings January 15, 2026 13:10
@dosubot dosubot Bot added the size:L This PR changes 100-499 lines, ignoring generated files. label Jan 15, 2026
@dosubot dosubot Bot added the python:uv Pull requests that update python:uv code label Jan 15, 2026
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR enhances configuration validation and removes a server limit to support continuous operation on hosted environments. It adds Range validators to prevent invalid environment variable values, removes the UVICORN_LIMIT_MAX_REQUESTS setting to allow indefinite server runtime, and documents security considerations from vulnerability scans.

Changes:

  • Added Range validation to 11 environment variables (timeouts, cache sizes, rate limits, and request sizes)
  • Removed UVICORN_LIMIT_MAX_REQUESTS configuration and its references throughout the codebase
  • Updated documentation with acceptable value ranges and security considerations from Airtable vulnerability scan
  • Updated dependencies: cyclopts (4.4.5→4.4.6), prometheus-client (0.24.0→0.24.1), ty (0.0.11→0.0.12)

Reviewed changes

Copilot reviewed 6 out of 7 changed files in this pull request and generated 1 comment.

Show a summary per file
File Description
uv.lock Dependency updates for cyclopts, prometheus-client, ty, and version bump to 0.4.4
src/frankfurtermcp/init.py Added Range validators to environment variables and commented out UVICORN_LIMIT_MAX_REQUESTS
src/frankfurtermcp/server.py Removed UVICORN_LIMIT_MAX_REQUESTS from logging and uvicorn.run() call
src/frankfurtermcp/middleware.py Added clarifying comment about max_body_size behavior when set to 0 or less
README.md Updated documentation with acceptable ranges, security considerations section, and commented out UVICORN_LIMIT_MAX_REQUESTS
.env.template Commented out UVICORN_LIMIT_MAX_REQUESTS variable
pyproject.toml Version bump from 0.4.3 to 0.4.4

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment thread src/frankfurtermcp/__init__.py Outdated
@anirbanbasu anirbanbasu merged commit a11c9dd into master Jan 15, 2026
1 check passed
@anirbanbasu anirbanbasu deleted the 83-improve-vulnerability-rating-further-and-fix-rate-limiter-configuration branch January 15, 2026 13:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request python:uv Pull requests that update python:uv code size:L This PR changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Improve vulnerability rating further and fix rate limiter configuration

2 participants