Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Security: stanmoore1/lammps

Security

SECURITY.md

Security Policy

LAMMPS is designed as a user-level application to conduct computer simulations for research using classical mechanics. As such LAMMPS depends to some degrees on users providing correctly formatted input and LAMMPS needs to read and write files based on uncontrolled user input. As a parallel application for use in high-performance computing environments, performance critical steps are also done without checking data.

LAMMPS also is interfaced to a number of external libraries, including libraries with experimental research software, that are not validated and tested by the LAMMPS developers, so it is easy to import bad behavior from calling functions in one of those libraries.

Thus is is quite easy to crash LAMMPS through malicious input and do all kinds of file system manipulations. And because of that LAMMPS should NEVER be compiled or run as superuser, either from a "root" or "administrator" account directly or indirectly via "sudo" or "su".

Therefore what could be seen as a security vulnerability is usually either a user mistake or a bug in the code. Bugs can be reported in the LAMMPS project issue tracker on GitHub.

To mitigate issues with using homoglyphs or bidirectional reordering in unicode, which have been demonstrated as a vector to obfuscate and hide malicious changes to the source code, all LAMMPS submissions are checked for unicode characters and only all-ASCII source code is accepted.

Version Updates

LAMMPS follows a continuous release development model. We aim to keep the development version (develop branch) always fully functional and employ a variety of automatic testing procedures to detect failures of existing functionality from adding or modifying features. Most of those tests are run on pull requests and must be passed before merging to the develop branch. The develop branch is protected, so all changes must be submitted as a pull request and thus cannot avoid the automated tests.

Additional tests are run after merging. Before releases are made all tests must have cleared. Then a release tag is applied and the release branch is fast-forwarded to that tag. This is referred to to as a "feature release". Bug fixes and updates are applied first to the develop branch. Later, they appear in the release branch when the next patch release occurs. For stable releases, backported bug fixes and infrastructure updates are first applied to the maintenance branch and then merged to stable and published as "updates". For a new stable release the stable branch is updated to the corresponding state of the release branch and a new stable tag is applied in addition to the release tag.

Integrity of Downloaded Archives

For all files that can be downloaded from the "lammps.org" web server we provide SHA-256 checksum data in files named SHA256SUM. These checksums can be used to validate the integrity of the downloaded archives. Please note that we also use symbolic links to point to the latest or stable releases and the checksums for those files will change (and so their checksums) because the symbolic links will be updated for new releases.

Immutable GitHub Releases

Starting with LAMMPS version 10 Sep 2025 the LAMMPS releases published on GitHub are configured as immutable. This means that after the release is published the release tag cannot be changed or any of the uploaded assets, i.e. the source tarball, the static Linux executable tarball and the pre-compiled packages of LAMMPS with LAMMPS-GUI included. GitHub will generate a release attestation JSON file which can be used to verify the integrity of the files provided with the release.

There aren’t any published security advisories