mirror of
https://github.com/zebrajr/tensorflow.git
synced 2025-12-06 00:19:58 +01:00
Merge pull request #61066 from computerscienceiscool:patch-1
PiperOrigin-RevId: 543453661
This commit is contained in:
commit
2fe6b745ea
12
SECURITY.md
12
SECURITY.md
|
|
@ -229,11 +229,11 @@ and [the Google OSS VRP
|
|||
rules](https://bughunters.google.com/about/rules/6521337925468160/google-open-source-software-vulnerability-reward-program-rules)).
|
||||
|
||||
**Note**: Although the iterative exploration of TF API via fuzzing
|
||||
`tf.raw_ops.xxx` symbols is the best way to uncover code weakeness, please bear
|
||||
in mind that this is not a typical usecase that has security implications. It is
|
||||
better to try to translate the vulnerability to something that can be exploited
|
||||
during training or inference of a model (i.e., build a model that when given a
|
||||
specific input would produce unwanted behavior). Alternatively, if the
|
||||
`tf.raw_ops.xxx` symbols is the best way to uncover code weakness, please bear
|
||||
in mind that this is not a typical use case that has security implications. It
|
||||
is better to try to translate the vulnerability to something that can be
|
||||
exploited during training or inference of a model (i.e., build a model that when
|
||||
given a specific input would produce unwanted behavior). Alternatively, if the
|
||||
TensorFlow API is only used in ancillary tooling, consider the environment where
|
||||
the tool would run. For example, if `saved_model_cli` tool would crash on
|
||||
parsing a `SavedModel` that is not considered a vulnerability but a bug (since
|
||||
|
|
@ -254,7 +254,7 @@ In addition, please include the following information along with your report:
|
|||
* Your name and affiliation (if any).
|
||||
* A description of the technical details of the vulnerabilities. It is very
|
||||
important to let us know how we can reproduce your findings.
|
||||
* A minimal example of the vulnerabity.
|
||||
* A minimal example of the vulnerability.
|
||||
* An explanation of who can exploit this vulnerability, and what they gain
|
||||
when doing so -- write an attack scenario. This will help us evaluate your
|
||||
report quickly, especially if the issue is complex.
|
||||
|
|
|
|||
Loading…
Reference in New Issue
Block a user