We support only the latest v0.x release series. Backports are not provided for older versions.
- Latest version: v0.x series
- Security updates: Applied only to the current release series
- Older versions: Not supported for security updates
For security vulnerabilities, please do not open a public issue.
Instead, report vulnerabilities privately through:
- GitHub Security Advisories: Use the "Report a vulnerability" button on our GitHub page
- Email: [email protected] (for sensitive issues requiring encrypted communication) (coming soon)
When reporting a vulnerability, please include:
- Description: Clear description of the vulnerability
- Impact: Potential impact on users and systems
- Reproduction: Steps to reproduce the issue
- Environment: Version information and system details
- Proof of Concept: Code or examples demonstrating the vulnerability
Our security response process:
- Acknowledgment: Within 72 hours of receiving a report
- Triage: Within 7 days to assess severity and impact
- Resolution: As soon as possible based on severity
- Disclosure: Coordinated disclosure with reporter
- Critical: Immediate resolution required (within 7 days)
- High: Resolution in next release (within 30 days)
- Medium: Resolution in next scheduled release
- Low: Resolution in future release
We consider the following security issues in scope:
- Soundness issues: Memory safety violations, undefined behavior
- Event file corruption: Incorrect CRC/framing producing silently corrupt event files
- Supply chain issues: Vulnerabilities in dependencies detected by
cargo audit - Data exposure: Unintended disclosure of training data or metrics
- Code execution: Arbitrary code execution through event file parsing
The following are considered out of scope:
- TensorBoard bugs: Issues in TensorBoard itself (report to TensorBoard project)
- Theoretical-only issues: Vulnerabilities without practical exploit paths
- Denial of service: Standard DoS attacks not specific to our implementation
- User configuration: Security issues resulting from user misconfiguration
- Keep updated: Always use the latest version
- Verify integrity: Check event files from untrusted sources
- Limit access: Restrict access to event files containing sensitive data
- Monitor: Watch for unusual behavior in training metrics
- Input validation: Validate all external inputs
- Memory safety: Use Rust's safety features and avoid unsafe code
- Error handling: Handle errors gracefully without exposing sensitive information
- Dependencies: Regularly audit dependencies for vulnerabilities
We maintain supply chain security through:
- Dependency auditing: Regular
cargo auditchecks - License compliance:
cargo denyfor license policy enforcement - Code review: All changes reviewed by maintainers
- CI/CD security: Secure build and release processes
When we fix a security vulnerability:
- Private fix: Develop and test the fix privately
- Coordinated disclosure: Work with reporter on disclosure timeline
- Security advisory: Publish GitHub Security Advisory
- Security release: Release fixed version
- Public disclosure: Announce after grace period
The torchforge-rs security team:
- Primary: [email protected]
- GitHub: @torchforge-rs/security team
- Response: Security team members handle vulnerability reports
We thank security researchers for:
- Responsible disclosure practices
- Detailed vulnerability reports
- Collaboration on fixes
- Patience during the disclosure process
For security-related questions:
- Vulnerability reports: Use private reporting methods
- Security best practices: Open an issue with "security" label
- General questions: Use GitHub Discussions