MarkGPT takes security seriously. We appreciate your efforts and responsible disclosure of any security issues.
If you discover a security vulnerability, please do NOT open a public GitHub issue. Instead, please disclose it responsibly:
Email: iwstechnical@gmail.com
Subject: [SECURITY] Brief description of vulnerability
In your report, please include:
- Description - Clear description of the vulnerability
- Location - Which file(s), module(s), or component(s) are affected
- Severity - Impact assessment (Critical, High, Medium, Low)
- Reproduction - Steps to reproduce or proof-of-concept code
- Impact - What could an attacker do with this vulnerability?
- Suggested Fix - If you have a fix, please describe it
- Your Details - How you'd like us to credit you (optional)
Examples of security issues we take seriously:
- Data Privacy: Code that exposes personal information or training data
- Dependency Vulnerabilities: Known vulnerable versions of libraries
- Authentication/Authorization: Bypass mechanisms or access control issues
- Injection Attacks: Code injection, prompt injection in LLM contexts
- Cryptography: Weak encryption, misuse of cryptographic functions
- Model Safety: Model outputs that could cause harm
- Infrastructure: Cloud credential exposure, misconfigured resources
- Documentation: Security-related documentation errors that could mislead users
When we receive a vulnerability report:
- Acknowledge your report within 48 hours
- Assess the vulnerability severity
- Develop a fix or mitigation strategy
- Test the fix thoroughly
- Release a security patch or updated version
- Credit you publicly (unless you prefer anonymity)
| Severity | Initial Response | Target Fix | Public Disclosure |
|---|---|---|---|
| Critical | 24 hours | 7 days | 30 days after fix |
| High | 48 hours | 14 days | 60 days after fix |
| Medium | 1 week | 30 days | 90 days after fix |
| Low | 2 weeks | 60 days | 120 days after fix |
Note: These timelines are targets. Actual times depend on fix complexity.
Security issues in scope:
- Main MarkGPT codebase (src/, modules/)
- Project dependencies and imports
- Documentation related to security/data handling
- Configuration and deployment guidance
- GitHub infrastructure and workflows
Out of scope:
- Third-party services and dependencies (report to upstream maintainers)
- User-created vulnerabilities in forked versions
- Denial-of-service attacks on infrastructure
- Social engineering or phishing attacks
When contributing, please keep security in mind:
- Never commit secrets (API keys, tokens, credentials)
- Follow the principle of least privilege
- Validate and sanitize user inputs
- Use
.gitignoreto exclude sensitive files - Check dependencies for known vulnerabilities:
pip audit
- Be careful with personal data, especially:
- Student learning data
- Banso language speaker information
- Any PII (Personally Identifiable Information)
- Follow data privacy regulations (GDPR, etc.)
- Document data sources and usage restrictions
- Don't include real personal data in examples
- Keep dependencies up to date
- Review new dependencies for security
- Check the National Vulnerability Database (NVD)
- Use
pip auditorsafetyto check for known vulnerabilities
- Document security assumptions
- Explain data flows and where data is stored
- Note any limitations or risks
- Don't document potential attack vectors
Our project uses automated security scanning:
- GitHub Dependabot for dependency vulnerabilities
- SAST (Static Application Security Testing) tools
- Regular code audits
All security scan results are reviewed by maintainers.
- OWASP Top 10 - Common web security issues
- CWE Top 25 - Most dangerous software weaknesses
- Python Security Best Practices
- Banso Language Data Privacy Considerations
- Data Collection Guide
We're grateful for your dedication to keeping MarkGPT secure. Security researchers and contributors who help us improve security are invaluable to our community.
Last Updated: This policy will be reviewed and updated as the project evolves.
Questions? Email iwstechnical@gmail.com