This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/zeppelin-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 90c0f1c03 Automatic Site Publish by Buildbot
90c0f1c03 is described below

commit 90c0f1c03036b249c2bc21bce92169fbbf9c5f0d
Author: buildbot <us...@infra.apache.org>
AuthorDate: Sat Feb 24 15:16:31 2024 +0000

    Automatic Site Publish by Buildbot
---
 output/atom.xml      | 2 +-
 output/rss.xml       | 4 ++--
 output/security.html | 8 ++++++++
 3 files changed, 11 insertions(+), 3 deletions(-)

diff --git a/output/atom.xml b/output/atom.xml
index 409e307c7..b25cb5dc9 100644
--- a/output/atom.xml
+++ b/output/atom.xml
@@ -4,7 +4,7 @@
  <title>Apache Zeppelin</title>
  <link href="http://zeppelin.apache.org/"; rel="self"/>
  <link href="http://zeppelin.apache.org"/>
- <updated>2024-02-17T13:54:32+00:00</updated>
+ <updated>2024-02-24T15:16:23+00:00</updated>
  <id>http://zeppelin.apache.org</id>
  <author>
    <name>The Apache Software Foundation</name>
diff --git a/output/rss.xml b/output/rss.xml
index a78c62a0f..c858b8d5c 100644
--- a/output/rss.xml
+++ b/output/rss.xml
@@ -5,8 +5,8 @@
         <description>Apache Zeppelin - The Apache Software 
Foundation</description>
         <link>http://zeppelin.apache.org</link>
         <link>http://zeppelin.apache.org</link>
-        <lastBuildDate>2024-02-17T13:54:32+00:00</lastBuildDate>
-        <pubDate>2024-02-17T13:54:32+00:00</pubDate>
+        <lastBuildDate>2024-02-24T15:16:23+00:00</lastBuildDate>
+        <pubDate>2024-02-24T15:16:23+00:00</pubDate>
         <ttl>1800</ttl>
 
 
diff --git a/output/security.html b/output/security.html
index e4869e211..cfc1038c6 100644
--- a/output/security.html
+++ b/output/security.html
@@ -211,6 +211,14 @@ trusted users access to Zeppelin. Specifically, unless 
Docker or K8s
 isolation has been configured as mentioned above, users technically
 have access to all notes by other users.</p>
 
+<h2>Executable verification</h2>
+
+<p>When running Zeppelin service, be mindful that it utilizes executables
+which might be pre-installed on your server or container. These
+executables could potentially be altered for malicious purposes. 
+To mitigate this risk, it&#39;s recommended to set the paths to trusted
+locations for these executables, such as PYTHON and SPARK_HOME.</p>
+
 <h1>Reporting security issues</h1>
 
 <p>If you have found a potential security issue in Zeppelin,

Reply via email to