The following versions of DataVerse currently receive security updates:
Version | Supported | Security Updates Until |
---|---|---|
1.1.1 | ✅ | July 2025 |
1.1.2 | ✅ | Septembber 2025 |
We take security seriously and appreciate your efforts to responsibly disclose any vulnerabilities.
- Preferred Method: Email [email protected] with "[DataVerse Security]" in the subject
- Alternative: Create a GitHub issue with the "security" label (for non-critical issues)
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Any suggested mitigation approaches
- Acknowledgement: You will receive a response within 3 business days
- Investigation: Our team will verify the report within 10 business days
- Update: Regular status updates throughout the process
- Resolution: Patch released or mitigation guidance provided
Particular attention is given to vulnerabilities in:
- Model serialization/deserialization
- Data input validation
- Authentication/authorization flows
- Sensitive data handling in:
- Stock price estimation modules
- User-uploaded data processing
- Model inference endpoints
- Always validate input data before processing
- Run DataVerse in isolated environments when handling sensitive data
- Regularly update to the latest supported version
- Review model artifacts from untrusted sources before loading
Critical vulnerabilities will receive patches within:
- 72 hours for critical issues (CVSS ≥ 9.0)
- 14 days for high severity issues (CVSS 7.0-8.9)
- Next scheduled release for medium/low severity
DataVerse uses the following security measures for dependencies:
- Regular scans with
safety
anddependabot
- Pinned requirements with hash verification
- Quarterly dependency audits
For more information about our security practices, please contact [email protected].