If you discover a security vulnerability in Resound Studio, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, email the maintainers directly or use GitHub's private vulnerability reporting feature.
Several engine files use torch.load(..., weights_only=False) to load voice embeddings. This allows arbitrary code execution via pickle deserialization.
Risk: If a user loads a malicious .pt voice file from an untrusted source, it could execute arbitrary code.
Mitigation:
- Resound Studio is a local-first application — all voice files are generated locally by default
- Do not load
.ptfiles from untrusted sources - We plan to migrate to
safetensorsformat in a future release
The backend allows CORS from localhost:3000 and 127.0.0.1:3000. This is safe for local development but should be restricted further if deployed to a network.
| Version | Supported |
|---|---|
| 1.x | ✅ |