We actively support the following versions of QMANN with security updates:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
The QMANN team takes security seriously. If you discover a security vulnerability, please follow these steps:
Please do not create a public GitHub issue for security vulnerabilities. This could put users at risk.
Send an email to info@neuraparse.com (or contact the maintainers directly) with:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (if you have them)
- Initial Response: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability within 5 business days
- Fix Timeline: Critical vulnerabilities will be addressed within 7 days, others within 30 days
- Disclosure: We will coordinate with you on responsible disclosure
When reporting a vulnerability, please include:
- Type of vulnerability (e.g., code injection, privilege escalation, etc.)
- Location (file path, function name, line number if possible)
- Impact (what an attacker could achieve)
- Reproduction steps (detailed steps to reproduce)
- Proof of concept (if applicable and safe to share)
- Suggested mitigation (if you have ideas)
QMANN involves quantum computing components that have unique security considerations:
- Quantum State Privacy: Quantum states may contain sensitive information
- Circuit Tampering: Malicious modification of quantum circuits
- Side-Channel Attacks: Information leakage through quantum measurements
- Classical-Quantum Interface: Security at the boundary between classical and quantum components
Standard security practices apply to the classical components:
- Input Validation: All user inputs are validated
- Dependency Security: Regular updates of dependencies
- Code Injection: Protection against malicious code execution
- Data Privacy: Secure handling of training data and model parameters
Since QMANN is a research project:
- Experimental Data: Secure storage and transmission of research data
- Model Weights: Protection of trained model parameters
- Reproducibility: Ensuring security doesn't compromise reproducibility
- Collaboration: Secure sharing of research artifacts
- Verify Downloads: Always download from official sources
- Check Signatures: Verify package signatures when available
- Use Virtual Environments: Isolate QMANN installations
- Regular Updates: Keep QMANN and dependencies updated
- Input Sanitization: Validate all data inputs to QMANN models
- Access Control: Limit access to quantum hardware credentials
- Network Security: Use secure connections for remote quantum backends
- Logging: Monitor and log quantum circuit executions
- Code Review: All contributions undergo security review
- Static Analysis: Regular security scanning of codebase
- Dependency Scanning: Automated vulnerability detection in dependencies
- Secure Defaults: Security-first default configurations
- Quantum Simulation: Classical simulation may leak quantum state information
- Hardware Access: Quantum hardware access requires credential management
- Network Communication: Communication with quantum backends over networks
- Experimental Nature: Research code may have undiscovered vulnerabilities
- Encryption: Sensitive data is encrypted at rest and in transit
- Access Controls: Role-based access to quantum resources
- Audit Logging: Comprehensive logging of security-relevant events
- Regular Reviews: Periodic security assessments
Security updates will be:
- Prioritized: Security fixes take precedence over feature development
- Documented: Clear documentation of what was fixed
- Communicated: Users notified through multiple channels
- Tested: Thoroughly tested before release
For security-related questions or concerns:
- Email: info@neuraparse.com
- Organization: Neura Parse (@neuraparse)
- Website: https://neuraparse.com
- GPG Key: [Link to public key if available]
We appreciate the security research community's efforts to improve QMANN's security. Researchers who responsibly disclose vulnerabilities will be acknowledged (with their permission) in our security advisories.
This security policy is subject to our Code of Conduct and Contributing Guidelines. By participating in our security process, you agree to these terms.
Last Updated: July 2025 Version: 1.0