QuantUI is an educational teaching tool designed for classroom and local research use. It runs calculations inside your own Python session — there is no server, no user accounts, and no data stored outside your local machine.
| Version | Supported |
|---|---|
| 0.1.x | Yes |
If you find a security issue (e.g. a path-traversal bug, an unsafe use of
subprocess, or a dependency with a known CVE), please do not open a public
GitHub issue.
Instead, report it privately via one of these channels:
- GitHub private vulnerability reporting — use the Security tab on this repository (preferred).
- Email — contact the lab maintainer through the GitHub profile @The-Schultz-Lab.
Please include:
- A short description of the issue and its potential impact
- Steps to reproduce (or a minimal proof-of-concept)
- The version of QuantUI affected
- Your suggested fix, if you have one
We aim to acknowledge reports within 5 business days and to release a fix within 30 days for confirmed vulnerabilities.
This project is a local teaching tool. The threat model is limited — there is no multi-user server, no authentication layer, and no persistent user data. The primary security concerns are:
- Path traversal in file I/O (molecule XYZ parsing, script export)
- Unsafe subprocess calls (none currently;
subprocessis not used in the main package — PySCF runs in-process via the Python API) - Dependency vulnerabilities in the scientific Python stack (numpy, pyscf, ase, etc.) — monitored via Dependabot
Issues that are explicitly out of scope:
- Vulnerabilities that require physical access to the machine running the notebook
- Vulnerabilities in Jupyter/JupyterHub itself (report those upstream)
- Social-engineering or phishing attacks
QuantUI relies on PySCF, ASE, NumPy, Matplotlib, ipywidgets, and py3Dmol. Security advisories for these packages are tracked automatically via Dependabot. If you become aware of a critical CVE in one of these dependencies before Dependabot picks it up, please report it using the channels above.