Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: explicitly state no security for this repo #754

Merged
merged 1 commit into from
Mar 21, 2023
Merged

Conversation

jthegedus
Copy link
Contributor

Summary

Explicitly state that asdf does not provide security policy for the plugins listed in this repo.

@jthegedus jthegedus requested a review from a team as a code owner February 13, 2023 15:48
@jthegedus jthegedus requested a review from Stratus3D February 13, 2023 15:50
@aabouzaid
Copy link
Contributor

Yeah, I was about to mention that.
asdf is great, but all plugins are not secure by design.

@jthegedus
Copy link
Contributor Author

jthegedus commented Feb 13, 2023

all plugins are not secure by design

I do not know of a single system that has OSS plugin model where the plugins are considered secure.

@aabouzaid
Copy link
Contributor

aabouzaid commented Feb 14, 2023

@jthegedus I believe that the feature in asdf-vm/asdf#916 should mitigate that by setting the git ref (especially the hash) to make sure the users will get exactly what they expected.

There will always be a security risk, we just need to make the flow more secure :-)

@jthegedus
Copy link
Contributor Author

Yeah, I really need to update asdf-vm/asdf#1204 which has the latest solve for that.

@jthegedus
Copy link
Contributor Author

@Stratus3D do you think this is acceptable?

@jthegedus jthegedus merged commit a5f9796 into master Mar 21, 2023
@jthegedus jthegedus deleted the security-policy branch March 21, 2023 01:47
mbutov pushed a commit to mbutov/asdf-plugins that referenced this pull request May 6, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants