A newer version of the Gradio SDK is available:
6.1.0
Security Policy
Supported Versions
| Version | Supported |
|---|---|
| 0.1.x | :white_check_mark: |
Reporting a Vulnerability
We take security seriously. If you discover a security vulnerability in DeepBoner, please report it responsibly.
How to Report
- DO NOT open a public GitHub issue for security vulnerabilities
- Email security concerns to the repository maintainers via GitHub's private vulnerability reporting
- Or use GitHub's Security Advisory feature: Security tab > Report a vulnerability
What to Include
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Response Timeline
- Acknowledgment: Within 48 hours
- Initial assessment: Within 7 days
- Fix timeline: Depends on severity
- Critical: Within 48 hours
- High: Within 7 days
- Medium: Within 30 days
- Low: Next release cycle
Security Measures
API Key Handling
- API keys are loaded from environment variables only
- Keys are never logged or exposed in error messages
.envfiles are gitignored- No hardcoded credentials in source code
Dependency Security
- Regular dependency audits via
pip-audit - Security scanning with
banditin CI - Pinned dependencies for reproducibility
- Known CVE fixes:
mcp>=1.23.0- Fixes GHSA-9h52-p55h-vw2flanggraph-checkpoint-sqlite>=3.0.0- Fixes GHSA-wwqv-p2pp-99h5urllib3>=2.6.0- Fixes GHSA-gm62-xv2j-4w53 and GHSA-2xpw-w6gg-jr37
External API Security
- HTTPS enforced for all external API calls
- Rate limiting prevents abuse
- No sensitive data sent to external services (only search queries)
Input Validation
- Pydantic models for strict input validation
- Query sanitization before external API calls
- Length limits on user inputs
Security Best Practices for Users
API Keys
- Never commit
.envfiles - Use environment variables in production
- Rotate keys periodically
- Use minimal permissions (read-only where possible)
Deployment
- Use the provided Docker image for consistency
- Keep dependencies updated
- Monitor for security advisories
- Use HTTPS in production
HuggingFace Spaces
- Use Secrets (not public variables) for API keys
- The HF_TOKEN is used server-side only
- Users don't need their own tokens
Known Security Considerations
Third-Party APIs
DeepBoner queries external biomedical databases:
- PubMed (NCBI)
- ClinicalTrials.gov
- Europe PMC
- OpenAlex
These are trusted public APIs, but:
- Query content is visible to these services
- Rate limits apply
- Availability depends on upstream services
LLM Providers
- OpenAI and HuggingFace process your queries
- Review their privacy policies if handling sensitive research
- Consider on-premise alternatives for sensitive use cases
Local Data
- ChromaDB stores embeddings locally
- Default path:
./chroma_db/ - Contains processed search results (not raw user data)
- Secure or delete when decommissioning
Security Updates
Security updates will be released as patch versions (e.g., 0.1.1) and announced via:
- GitHub Security Advisories
- Release notes
"Security is rock solid. We take evidence-based security very seriously." π