Skip to content

Commit b4f8474

Browse files
committed
docs: add extra security best practice about customer access
1 parent 22bd3f6 commit b4f8474

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -266,6 +266,8 @@ We recommend the following best practices to mitigate security risks when using
266266

267267
- **Don't connect to production**: Use the MCP server with a development or staging project, not production. LLMs are great at helping design and test applications, so leverage them in a safe environment without exposing real data.
268268

269+
- **Don't give to your customers**: The MCP server operates under the context of your developer permissions, so it should not be given to your customers or end users. Instead, use it internally as a developer tool to help you build and test your applications. We are working on a separate [PostgREST MCP server](#other-mcp-servers) that allows you to connect your own users to your app via REST API, which will be more suitable for production use.
270+
269271
- **Read-only mode**: If you must connect to real data, set the server to [read-only](#read-only-mode) mode, which executes all queries as a read-only Postgres user.
270272

271273
- **Project scoping**: Scope your MCP server to a [specific project](#project-scoped-mode), limiting access to only that project's resources. This prevents LLMs from accessing data from other projects in your Supabase account.

0 commit comments

Comments
 (0)