| Version | Supported |
|---|---|
| 1.x | ✅ |
If you discover a security vulnerability in DTAT OCR, please report it responsibly:
- Do NOT open a public GitHub issue for security vulnerabilities
- Email the maintainer directly or use GitHub's private vulnerability reporting
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- DTAT OCR processes user-uploaded files which may contain malicious content
- Files are processed in isolated temporary directories
- Original files are stored as base64 in the database (be mindful of database access)
- The API does not include authentication by default
- For production deployments, add authentication middleware
- Consider rate limiting for public-facing deployments
- Docker images run as non-root where possible
- Model weights are baked into images (no runtime downloads in offline mode)
- Use Docker secrets for sensitive environment variables
- Use IAM roles instead of access keys when possible
- Restrict Textract permissions to only what's needed
- Enable VPC endpoints to keep traffic private
- Run behind a reverse proxy (nginx, Traefik) with TLS
- Enable authentication for the API
- Use environment variables for secrets (never commit them)
- Regularly update dependencies for security patches
- Monitor logs for suspicious activity