Skip to content

Commit 44e5c27

Browse files
d4l3kfacebook-github-bot
authored andcommitted
Create SECURITY.md (#390)
Summary: As titled Pull Request resolved: #390 Reviewed By: XilunWu, c-p-i-o Differential Revision: D64268830 Pulled By: d4l3k fbshipit-source-id: 8da342f6c1edf1fae581ada7e6ef6c101619c1c9
1 parent 9a6b9dc commit 44e5c27

File tree

1 file changed

+27
-0
lines changed

1 file changed

+27
-0
lines changed

SECURITY.md

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Security Policy
2+
3+
gloo best security practices largely follow the same ones as for PyTorch Distributed. Please see https://github.com/pytorch/pytorch/blob/main/SECURITY.md for the most up to date security practices.
4+
5+
## Reporting Security Issues
6+
7+
Beware that none of the topics under [Using Gloo Securely](#using-gloo-securely) are considered vulnerabilities of Gloo.
8+
9+
However, if you believe you have found a security vulnerability in Gloo, we encourage you to let us know right away. We will investigate all legitimate reports and do our best to quickly fix the problem.
10+
11+
Vulnerabilities that are exploitable via the network such as remote code execution should be reported. Issues that require access to the sending/receiving machine or are caused by incorrectly using the API are not considered vulnerabilities in Gloo.
12+
13+
Please report security issues via https://www.facebook.com/whitehat or by filing an issue for low risk vulnerabilities.
14+
15+
Please refer to the following page for our responsible disclosure policy, reward guidelines, and those things that should not be reported:
16+
17+
https://www.facebook.com/whitehat
18+
19+
## Using Gloo Securely
20+
21+
The only way to guarantee safety with Gloo is to run it in a trusted environment with trusted inputs. Gloo has not been security hardened and bugs as well as misusages of Gloo may result in remote code execution and data leakage.
22+
23+
For performance reasons, most users of Gloo (such as PyTorch) do not use any authorization protocol and will send messages unencrypted. They accept connections from anywhere, and execute the workload sent without performing any checks. Therefore, if you run a Gloo based program on your network, anybody with access to the network may be able to execute arbitrary code and access your data.
24+
25+
If you have a usecase where you do need higher levels of security, Gloo does support TLS but provides no guarantees of security or validity of authorization.
26+
27+
When calling Gloo APIs it is up to the user to validate that the inputs are safe and correct. Invalid inputs to Gloo may result in buffer overflows or other security related issues.

0 commit comments

Comments
 (0)