ModelCypher handles sensitive model weights and potential training data. Security is paramount.
- Never commit API keys. Use
.envfiles. - ModelCypher respects
HF_TOKENenvironment variables for Hugging Face authentication. - Do not hardcode tokens in Python scripts.
- Prefer
safetensors: We default tosafetensorsfor all model saving/loading to avoid pickle execution vulnerabilities. - Pickle Warning: Some workflows (e.g., LoRA adapter merge) may use
torch.loadfor.bin/.ptfiles, which relies on pickle. - Untrusted Models: Do not load
.bin/.ptweights from untrusted sources.
ModelCypher disables trust_remote_code by default to avoid executing model-supplied code.
export MC_TRUST_REMOTE_CODE=1Only enable this for models you trust.
- TLS 1.2+: All network connections (HF Hub, MLflow) default to strict TLS.
- No Telemetry: ModelCypher does not phone home. All "training dynamics" data is stored locally or sent only to your configured MLflow server.
If you discover a security vulnerability, please do not open a public issue. Email jason@ethyros.ai.