Architecture Security
Deployment Modes
Local Mode
Recommended for security-sensitive environments
- Runs entirely on localhost via stdio
- Zero external network calls
- All communication stays local
Remote Mode
For browser-based MCP clients
- SSE transport via Cloudflare Workers
- OAuth tokens handled server-side
- All traffic encrypted (HTTPS)
Data Handling
| Aspect | Details |
|---|---|
| Data Storage | None. No design data is persisted or cached to disk. |
| Telemetry | None. No analytics, tracking, or usage data collection. |
| Logging | Local only. Logs stay on your machine. |
| Credentials | Stored in your local MCP config, never transmitted to third parties. |
Authentication
Figma Console MCP uses Figma’s native authentication:Personal Access Tokens (PATs)
Personal Access Tokens (PATs)
- Generated in Figma account settings
- Stored locally in your MCP client config
- Never transmitted except to
api.figma.com - Scoped permissions based on token configuration
OAuth (Remote Mode)
OAuth (Remote Mode)
- Uses Figma’s official OAuth 2.0 flow
- Tokens managed via Figma’s authorization servers
- No custom credential handling
Code Execution (figma_execute)
The figma_execute tool runs JavaScript in Figma’s plugin context:
Sandbox limitations:
- No filesystem access
- No network access outside Figma’s plugin APIs
- Cannot access other browser tabs or system resources
- Can only modify the currently open Figma file
- Desktop Bridge must be manually started
- All execution is user-initiated
- Changes covered by Figma’s version history
Data Access Scope
- Can Access
- Cannot Access
| Data Type | Access |
|---|---|
| Variables/Tokens | Read |
| Components | Read |
| Styles | Read |
| File Structure | Read |
| Console Logs | Read |
| Design Modifications | Write (via Desktop Bridge) |
Network Security
All network communication is limited to:api.figma.com— Figma’s official REST API (HTTPS)localhost— Local Desktop Bridge communication*.workers.dev— Remote mode only (HTTPS)
No external dependencies at runtime — No third-party analytics, CDNs, or external API calls beyond Figma.
Enterprise Considerations
Compliance
| Standard | Status |
|---|---|
| SOC 2 | Minimal surface (no data storage) |
| GDPR | No personal data collection |
| HIPAA | Not applicable |
Recommended Enterprise Setup
Self-Host (Optional)
Run your own Cloudflare Worker instance. See Self-Hosting Guide.
Audit Source Code
Complete source available on GitHub
Vulnerability Reporting
To report a security vulnerability:- Open a private security advisory on GitHub
- Include steps to reproduce and potential impact
- We aim to respond within 48 hours
Please use GitHub’s private security advisory feature rather than public issues.