Skip to content

Security: The-Schultz-Lab/QuantUI

Security

SECURITY.md

Security Policy

QuantUI is an educational teaching tool designed for classroom and local research use. It runs calculations inside your own Python session — there is no server, no user accounts, and no data stored outside your local machine.

Supported Versions

Version Supported
0.1.x Yes

Reporting a Vulnerability

If you find a security issue (e.g. a path-traversal bug, an unsafe use of subprocess, or a dependency with a known CVE), please do not open a public GitHub issue.

Instead, report it privately via one of these channels:

  • GitHub private vulnerability reporting — use the Security tab on this repository (preferred).
  • Email — contact the lab maintainer through the GitHub profile @The-Schultz-Lab.

Please include:

  1. A short description of the issue and its potential impact
  2. Steps to reproduce (or a minimal proof-of-concept)
  3. The version of QuantUI affected
  4. Your suggested fix, if you have one

We aim to acknowledge reports within 5 business days and to release a fix within 30 days for confirmed vulnerabilities.

Scope

This project is a local teaching tool. The threat model is limited — there is no multi-user server, no authentication layer, and no persistent user data. The primary security concerns are:

  • Path traversal in file I/O (molecule XYZ parsing, script export)
  • Unsafe subprocess calls (none currently; subprocess is not used in the main package — PySCF runs in-process via the Python API)
  • Dependency vulnerabilities in the scientific Python stack (numpy, pyscf, ase, etc.) — monitored via Dependabot

Issues that are explicitly out of scope:

  • Vulnerabilities that require physical access to the machine running the notebook
  • Vulnerabilities in Jupyter/JupyterHub itself (report those upstream)
  • Social-engineering or phishing attacks

Dependencies

QuantUI relies on PySCF, ASE, NumPy, Matplotlib, ipywidgets, and py3Dmol. Security advisories for these packages are tracked automatically via Dependabot. If you become aware of a critical CVE in one of these dependencies before Dependabot picks it up, please report it using the channels above.

There aren't any published security advisories