If you discover a security vulnerability in LiteParse, please report it responsibly:
- Do NOT open a public issue for security vulnerabilities
- Email security concerns to: security@llamaindex.ai
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Security issues we will address:
- Remote code execution in the CLI tool or library
- Vulnerabilities in LiteParse's own code that could be exploited
- Dependency vulnerabilities with known, exploitable CVEs
LiteParse is intended to be a local CLI tool and library, designed to process documents you provide. The following are not security vulnerabilities we will address:
- Malicious input files - Processing untrusted documents (zip bombs, malformed PDFs, path traversal in filenames, etc.) is the user's responsibility. If you're building a service that accepts untrusted uploads, you must implement your own validation, sandboxing, and resource limits.
- Denial of service via large/complex files - Documents that cause high memory usage, long processing times, or crashes are not security issues. Use
--max-pages, timeouts, and resource limits in your deployment. - Issues requiring a server setup - LiteParse does not include or recommend any specific production server deployment. Security of web services built on top of LiteParse is the deployer's responsibility.
- Theoretical attacks without proof of concept - Please include a working demonstration.
If you're exposing LiteParse through a web service or API:
- Validate uploads: Check file types, sizes, and origins before processing
- Use sandboxing: Run parsing in isolated containers with resource limits
- Set timeouts: Don't allow unbounded processing time
- Limit concurrency: Prevent resource exhaustion from parallel requests
- Don't trust filenames: Sanitize any paths derived from user input
These concerns are standard for any document processing service and are outside LiteParse's scope.