This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-staging in repository https://gitbox.apache.org/repos/asf/zeppelin-site.git
The following commit(s) were added to refs/heads/asf-staging by this push: new 90c0f1c03 Automatic Site Publish by Buildbot 90c0f1c03 is described below commit 90c0f1c03036b249c2bc21bce92169fbbf9c5f0d Author: buildbot <us...@infra.apache.org> AuthorDate: Sat Feb 24 15:16:31 2024 +0000 Automatic Site Publish by Buildbot --- output/atom.xml | 2 +- output/rss.xml | 4 ++-- output/security.html | 8 ++++++++ 3 files changed, 11 insertions(+), 3 deletions(-) diff --git a/output/atom.xml b/output/atom.xml index 409e307c7..b25cb5dc9 100644 --- a/output/atom.xml +++ b/output/atom.xml @@ -4,7 +4,7 @@ <title>Apache Zeppelin</title> <link href="http://zeppelin.apache.org/" rel="self"/> <link href="http://zeppelin.apache.org"/> - <updated>2024-02-17T13:54:32+00:00</updated> + <updated>2024-02-24T15:16:23+00:00</updated> <id>http://zeppelin.apache.org</id> <author> <name>The Apache Software Foundation</name> diff --git a/output/rss.xml b/output/rss.xml index a78c62a0f..c858b8d5c 100644 --- a/output/rss.xml +++ b/output/rss.xml @@ -5,8 +5,8 @@ <description>Apache Zeppelin - The Apache Software Foundation</description> <link>http://zeppelin.apache.org</link> <link>http://zeppelin.apache.org</link> - <lastBuildDate>2024-02-17T13:54:32+00:00</lastBuildDate> - <pubDate>2024-02-17T13:54:32+00:00</pubDate> + <lastBuildDate>2024-02-24T15:16:23+00:00</lastBuildDate> + <pubDate>2024-02-24T15:16:23+00:00</pubDate> <ttl>1800</ttl> diff --git a/output/security.html b/output/security.html index e4869e211..cfc1038c6 100644 --- a/output/security.html +++ b/output/security.html @@ -211,6 +211,14 @@ trusted users access to Zeppelin. Specifically, unless Docker or K8s isolation has been configured as mentioned above, users technically have access to all notes by other users.</p> +<h2>Executable verification</h2> + +<p>When running Zeppelin service, be mindful that it utilizes executables +which might be pre-installed on your server or container. These +executables could potentially be altered for malicious purposes. +To mitigate this risk, it's recommended to set the paths to trusted +locations for these executables, such as PYTHON and SPARK_HOME.</p> + <h1>Reporting security issues</h1> <p>If you have found a potential security issue in Zeppelin,