Replies: 2 comments 7 replies
-
If there is interest, it might make sense to apply to the GitHub Secure Open Source Fund (before August 12th) for this. |
Beta Was this translation helpful? Give feedback.
-
The main challenge is finding a proper way for fuzzing the We need a better way for re-creating the tensors on the server side instead of doing |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I've read this pull request that states the insecurity of the RPC server is well understood and until a plan is in place to harden the server the work should happen in the open, and not go through the advisory process. This makes sense and I appreciate the transparency.
It currently lacks authentication, contains memory address disclosure vulnerabilities and has no fuzzer targeting the client or server (although I did put one together here). Is there currently a plan to improve the security of the RPC server? If I were to write up what security controls are needed would that be helpful?
I wrote down quick thoughts up after spending a few hours looking at the implementation. Fixing these issues is entirely possible and I am willing to put in some time to implement the hardening measures required.
cc @rgerganov @CISC
Beta Was this translation helpful? Give feedback.
All reactions