We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| < 0.2 | ❌ |
We take the security of Onnx4Deeploy seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via:
- Email: Send details to the project maintainers (check repository for contact information)
- GitHub Security Advisory: Use the "Security" tab in the GitHub repository to privately report vulnerabilities
Please include the following information in your report:
- Type of vulnerability
- Full paths of affected source files
- Location of the affected code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability, including how an attacker might exploit it
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: Within 7 days
- High: Within 30 days
- Medium: Within 90 days
- Low: Next scheduled release
- Receipt: We will acknowledge receipt of your vulnerability report
- Assessment: We will confirm the vulnerability and determine its severity
- Fix: We will work on a fix and prepare a security advisory
- Release: We will release a patched version and publish the security advisory
- Credit: We will credit you in the advisory (unless you prefer to remain anonymous)
When using Onnx4Deeploy:
- Always use the latest stable version
- Keep dependencies up to date
- Use virtual environments to isolate dependencies
- Review ONNX models from untrusted sources before loading
# Safe: Load models you created or from trusted sources
model = onnx.load("path/to/trusted/model.onnx")
# Caution: Validate models from untrusted sources
# ONNX models can contain arbitrary Python code in custom operators
# Always inspect and validate before loadingWe use:
pre-commithooks with security checks- Automated dependency scanning in CI/CD
- Regular dependency updates
-
ONNX Model Loading: ONNX models can contain custom operators with arbitrary code
- Only load models from trusted sources
- Consider using
onnx.checker.check_model()before loading
-
PyTorch Models: When exporting PyTorch models, ensure model source is trusted
- Custom PyTorch operators can execute arbitrary code during export
-
Dependencies: Keep all dependencies updated
- PyTorch, ONNX, and ONNX Runtime may have their own security advisories
Security updates will be released as:
- Patch versions (0.2.x) for the current major version
- Security advisories published on GitHub
- Announcements in release notes and CHANGELOG
We appreciate the security research community's efforts in responsibly disclosing vulnerabilities. Contributors who report valid security issues will be acknowledged in:
- Security advisory
- CHANGELOG
- Project documentation (if desired)
Thank you for helping keep Onnx4Deeploy and its users safe!