Better output from the same model. Fused computation, adaptive precision, surgical expert loading. 305 KB, 19 backends, zero dependencies. https://inference-x.com
1.4 KiB
1.4 KiB
Security
Reporting Vulnerabilities
If you discover a security vulnerability, please report it privately:
- Email: Elmadani.SALKA@proton.me
- Subject: [SECURITY] Brief description
- Do NOT open a public issue for security vulnerabilities
Response time: within 48 hours. Critical vulnerabilities are patched within 7 days.
Security Design
Inference-X is designed for deployment in security-sensitive environments (defense, healthcare, finance, critical infrastructure).
Air-Gap Architecture
- No network calls during inference. Ever.
- No telemetry, analytics, or phone-home behavior
- No external dependencies (zero supply-chain attack surface)
- Models are local files — no download during operation
- The API server (
--serve) is opt-in and local-only by default
Build Integrity
- Single-file compilation — full source is visible and auditable
- No build-time code generation or preprocessor tricks
- Binary reproducibility: same source + same compiler = same binary
- No obfuscation — all code is readable
Identity Verification
The binary carries compile-time authorship attribution for intellectual property protection. This does not affect functionality or performance.
Supported Versions
| Version | Supported |
|---|---|
| Latest | ✅ |
Trademarks
"Inference-X" is a trademark of Salka Elmadani. See ENFORCEMENT.md for usage guidelines.