saurabhb-dev commented on code in PR #60564:
URL: https://github.com/apache/airflow/pull/60564#discussion_r2693161710


##########
airflow-core/docs/authoring-and-scheduling/assets.rst:
##########
@@ -143,7 +143,9 @@ In the example below, the final stored ``extra`` value is 
not guaranteed and it
 
     # It's not guaranteed which extra will be the one stored
 
-.. note:: **Security Note:** Asset URIs and values in the ``extra`` field are 
stored in cleartext in Airflow's metadata database. These fields are **not 
encrypted**. **DO NOT** store sensitive information, especially credentials, in 
either the asset URI or the ``extra`` dictionary.
+.. Security Warnings::
+1. **Secure naming of asset URIs:** Asset URIs and values in the ``extra`` 
field are stored in cleartext in Airflow's metadata database. These fields are 
**not encrypted**. **DO NOT** store sensitive information, especially 
credentials, in either the asset URI or the ``extra`` dictionary.
+2. **Security Implication of Asset Creation**: In Airflow's security model, 
granting the ``can_create`` permission on Assets is effectively equivalent to 
granting "trigger" permissions on all downstream DAGs that depend on those 
assets. Because Airflow uses an "implicit trust" model for data-aware 
scheduling, any user who can create an Asset Event (via the API or a task) can 
trigger any DAG scheduled on that asset, even if the user does not have 
permission to view or edit the downstream DAGs. Exercise caution when granting 
``can_create`` on Assets in multi-tenant environments, as it allows users to 
influence workflows outside their direct scope.

Review Comment:
   Thanks. It makes sense to ensure consistency with other Airflow docs pages.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to