We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 2.0.x | ✅ |
| < 2.0 | ❌ |
We take the security of VisDrone Toolkit seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Do not open a public GitHub issue for security vulnerabilities
- Do not discuss the vulnerability publicly until it has been addressed
Report security vulnerabilities via email to: your.email@example.com
Include the following information:
- Type of vulnerability
- Full paths of source file(s) related to the manifestation of the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability, including how an attacker might exploit it
After you submit a report:
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability and determine its impact
- Resolution: We will work on a fix and coordinate with you on disclosure
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)
- Security vulnerabilities will be disclosed once a fix is available
- We aim to patch critical vulnerabilities within 30 days
- We will coordinate with you on the disclosure timeline
-
Keep Dependencies Updated
pip install --upgrade visdrone-toolkit pip list --outdated
-
Validate Input Data
- Always validate datasets before training
- Check for malicious files in uploaded datasets
- Use trusted data sources
-
Secure Model Checkpoints
- Only load checkpoints from trusted sources
- Verify checkpoint integrity before loading
- Be cautious with user-uploaded model files
-
Environment Security
- Use virtual environments
- Keep PyTorch and dependencies updated
- Review security advisories for dependencies
-
API Keys and Credentials
- Never commit API keys or credentials
- Use environment variables for sensitive data
- Add
.envfiles to.gitignore
- Loading untrusted model checkpoints can execute arbitrary code
- Always verify the source of model files
- Consider using
torch.load(..., weights_only=True)when possible
- Image processing libraries may have vulnerabilities
- Keep PIL, OpenCV, and other image libraries updated
- Validate image files before processing
- If deploying as a web service, implement proper authentication
- Use HTTPS for all communications
- Implement rate limiting to prevent abuse
Security updates will be released as patch versions (e.g., 2.0.1, 2.0.2). We recommend:
- Subscribe to GitHub releases
- Watch the repository for security advisories
- Check CHANGELOG.md regularly
- Day 0: Vulnerability reported to maintainers
- Day 1-2: Acknowledgment sent to reporter
- Day 3-7: Vulnerability assessed and validated
- Day 7-30: Fix developed and tested
- Day 30: Security advisory published, patch released
None yet. This is version 2.0.
- Email: your.email@example.com
- PGP Key: [Coming soon]
We currently do not have a bug bounty program, but we appreciate and acknowledge security researchers who responsibly disclose vulnerabilities.
We thank the following security researchers for their responsible disclosure:
- [List will be updated as vulnerabilities are reported and fixed]
Thank you for helping keep VisDrone Toolkit and our users safe!