mirror of
https://github.com/azaion/ai-training.git
synced 2026-04-22 21:56:36 +00:00
142c6c4de8
- Replaced module-level path variables in constants.py with a structured Pydantic Config class. - Updated all relevant modules (train.py, augmentation.py, exports.py, dataset-visualiser.py, manual_run.py) to access paths through the new config structure. - Fixed bugs related to image processing and model saving. - Enhanced test infrastructure to accommodate the new configuration approach. This refactor improves code maintainability and clarity by centralizing configuration management.
1.9 KiB
1.9 KiB
Security Approach
Authentication
- API Authentication: JWT-based. Client sends email/password to
POST /login, receives JWT token used as Bearer token for subsequent requests. - Auto-relogin: On HTTP 401/403 responses, the client automatically re-authenticates and retries the request.
Encryption
- Model encryption: AES-256-CBC with a static key defined in
security.py. All model artifacts (ONNX, TensorRT) are encrypted before upload. - Resource encryption: AES-256-CBC with a hardware-derived key. The key is generated by hashing the machine's CPU model, GPU name, total RAM, and primary drive serial number. This ties decryption to the specific hardware.
- Implementation: Uses the
cryptographylibrary with PKCS7 padding. IV is prepended to ciphertext.
Model Protection
- Split storage: Encrypted models are split into a small part (≤3KB or 20% of total size) stored on the Azaion API server and a big part stored on S3-compatible CDN. Both parts are required to reconstruct the model.
- Hardware binding: Inference clients must run on authorized hardware whose fingerprint matches the encryption key used during upload.
Access Control
- CDN access: Separate read-only and write-only S3 credentials. Training uploads use write keys; inference downloads use read keys.
- Role-based annotation routing: Validator/Admin annotations go directly to validated storage; Operator annotations go to seed storage pending validation.
Known Security Issues
| Issue | Severity | Location |
|---|---|---|
| Hardcoded API credentials (email, password) | High | config.yaml |
| Hardcoded CDN access keys (4 keys) | High | cdn.yaml |
| Hardcoded model encryption key | High | security.py:67 |
| Queue credentials in plaintext | Medium | config.yaml, annotation-queue/config.yaml |
| No TLS certificate validation | Low | api_client.py |
| No input validation on API responses | Low | api_client.py |