| Version | Supported |
|---|---|
| latest | Yes |
If you discover a security vulnerability in mojo-tokenizer:
- Do not open a public issue
- Email: security@atsentia.com
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and work with you to address the issue.
- Tokenizers process arbitrary text input
- Always validate input size before processing
- Be cautious with untrusted vocabulary files
- Only load vocabulary files from trusted sources
- Verify file integrity before loading
- Malicious vocabulary files could cause denial of service
- mojo-tokenizer uses Mojo's memory safety features
- Large inputs may consume significant memory
- Consider input size limits in production
- Keep mojo-tokenizer updated to the latest version
- Validate and sanitize input text
- Use trusted vocabulary files only
- Monitor memory usage with large inputs
- Run with appropriate resource limits in production