Security

Bump.sh MCP servers are designed so that sensitive data never leaves the execution environment and is never exposed to the LLM. This page explains the architecture and the security measures in place.

Architecture #

Bump.sh MCP servers rely on two separate components:

Because the data plane executes API requests on behalf of the LLM, the LLM itself never directly calls APIs. This means credentials, tokens, and sensitive response data are never exposed to the model.

These two components communicate over encrypted channels (TLS) and are deployed independently.

The default data plane is hosted on Bump.sh infrastructure. On Custom plans, it can be installed on-premise in your own infrastructure.

What each component can access #

  Bump.sh application Data plane
Server configuration Yes Yes
Workflow documents Yes Yes
Secret values (decrypted) No Yes, in memory at runtime only
API requests and responses No Yes, during execution only
Execution logs with sensitive data No No

Data handling #

The data plane does not persist sensitive data. Specifically: