How Authentication Works
When you use Pylance MCP, secure authentication happens automatically in the background.What Gets Protected
Your Workspace
Only you can access your Python projects and code
Your Requests
Each API call is authenticated and encrypted
Your Data
Code analysis happens securely - nothing is shared
Your API Keys
Keys are hashed and never stored in plain text
Automatic Security Features
Every request is protected:- β Encrypted connections (TLS 1.3)
- β Secure token validation
- β Automatic session expiry
- β Rate limit protection
- β Workspace isolation
Authorization
Role-Based Access Control (RBAC)
| Role | Permissions | Use Case |
|---|---|---|
| Free | 100 requests/day | Personal projects |
| Hobby | 5,000 requests/day | Side projects |
| Pro | 50,000 requests/day | Professional development |
| Enterprise | Unlimited | Large teams |
Workspace Isolation
Each userβs workspace is isolated:File System Sandboxing
File System Sandboxing
Users can only access files within their workspace directory. No parent directory traversal.
Process Isolation
Process Isolation
Pylance runs in a separate process per user with resource limits (CPU, memory).
Network Restrictions
Network Restrictions
No outbound network access from analysis processes. Only MCP server can make external calls.
Data Security
Encryption
In Transit
All connections use TLS 1.3. No unencrypted traffic.
At Rest
PostgreSQL uses AES-256 encryption for stored data.
Environment Variables
Secrets stored in Railway/Fly.io encrypted vaults.
API Keys
Hashed with bcrypt before database storage.
Data Retention
| Data Type | Retention | Purpose |
|---|---|---|
| User code | Session only | Analysis, not stored |
| Request logs | 30 days | Debugging, auditing |
| Usage metrics | 90 days | Billing, analytics |
| Error reports | 7 days | Issue resolution |
Your code never leaves your machine when using local deployment. Cloud deployment analyzes code in memory only.
Rate Limiting
Prevents abuse and ensures fair usage:Rate Limit Headers
Responses include rate limit information:Vulnerability Management
Security Updates
Responsible Disclosure
Found a security issue? Email: security@pylancemcp.dev We typically respond within:- π΄ Critical: 4 hours
- π‘ High: 24 hours
- π’ Medium/Low: 72 hours
Compliance
GDPR Compliance
Right to Access: Download your data via API
Right to Erasure: Delete account removes all data
Data Portability: Export in JSON format
Privacy by Design: Minimal data collection
SOC 2 Type II
Enterprise plan includes SOC 2 Type II compliance:- Annual third-party audits
- Security controls documentation
- Incident response procedures
- Access logs and monitoring
Best Practices for Users
Protecting Your API Keys
Using the Service Securely
Keep Keys Private
API keys are like passwords - never share them publicly or in screenshots
Review Permissions
Only grant workspace access to projects you trust
Monitor Usage
Check your dashboard regularly for unexpected activity
Update Regularly
Keep your MCP client and IDE extensions updated
If You Suspect a Security Issue
Contact Support
Email security@pylancemcp.dev with details
Our Security Commitment
We take security seriously:- π Automatic Encryption: All data encrypted in transit and at rest
- π‘οΈ Regular Audits: Independent security audits for Enterprise customers
- β‘ Rapid Response: Critical vulnerabilities patched within 24 hours
- π Transparency: Security updates communicated promptly