| Version | Supported |
|---|---|
latest main |
✅ |
| older commits | ❌ |
Do not open a public issue for security vulnerabilities.
Instead, please report vulnerabilities privately by emailing [email protected] with:
- Description — What the vulnerability is and its potential impact
- Reproduction steps — Minimal steps to reproduce the issue
- Environment — OS, CUDA version, GPU model, Rust version
- Affected component — Which crate or kernel is affected
We will acknowledge receipt within 48 hours and provide an initial assessment within 7 days.
Atlas is an inference server that runs locally with GPU access. The primary threat surface includes:
- CUDA kernel safety — Out-of-bounds memory access, buffer overflows in GPU kernels
- HTTP API — Input validation on the OpenAI-compatible endpoint (
spark-server) - Weight loading — Malicious safetensor files, path traversal during model loading
- Unsafe Rust — Atlas uses
unsafeblocks for CUDA FFI; these are high-priority review targets
Atlas runs automated security checks in CI:
cargo deny— Audits dependencies for known advisories, license compliance, and banned crates (weekly + on every PR)cppcheck— Static analysis on CUDA kernel source
We follow coordinated disclosure. Once a fix is available, we will:
- Merge the fix to
main - Tag a release
- Credit the reporter (unless anonymity is requested)