If you believe you have found a security vulnerability in any SecretFlow repository that meets SecretFlow's definition of a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them to the ANT GROUP SECURITY Response Center at https://security.alipay.com/.
If you prefer to submit without logging in, send email to [email protected].
You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at https://security.alipay.com/.
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
- Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
This information will help us triage your report more quickly.
We prefer all communications to be in Chinese or English.
SecretFlow uses pickle.load to deserialize user model, etc. SecretFlow has already used whitelist and blacklist to improve security of pickle.load function, however, it is user's responsibility to provide and use secure model, dataset, etc in production. User should make sure these data are safe and take responsibility for the consequences of using insecure data.