This is an automated email from the ASF dual-hosted git repository.
git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/zeppelin-site.git
The following commit(s) were added to refs/heads/asf-staging by this push:
new 90c0f1c03 Automatic Site Publish by Buildbot
90c0f1c03 is described below
commit 90c0f1c03036b249c2bc21bce92169fbbf9c5f0d
Author: buildbot <[email protected]>
AuthorDate: Sat Feb 24 15:16:31 2024 +0000
Automatic Site Publish by Buildbot
---
output/atom.xml | 2 +-
output/rss.xml | 4 ++--
output/security.html | 8 ++++++++
3 files changed, 11 insertions(+), 3 deletions(-)
diff --git a/output/atom.xml b/output/atom.xml
index 409e307c7..b25cb5dc9 100644
--- a/output/atom.xml
+++ b/output/atom.xml
@@ -4,7 +4,7 @@
<title>Apache Zeppelin</title>
<link href="http://zeppelin.apache.org/" rel="self"/>
<link href="http://zeppelin.apache.org"/>
- <updated>2024-02-17T13:54:32+00:00</updated>
+ <updated>2024-02-24T15:16:23+00:00</updated>
<id>http://zeppelin.apache.org</id>
<author>
<name>The Apache Software Foundation</name>
diff --git a/output/rss.xml b/output/rss.xml
index a78c62a0f..c858b8d5c 100644
--- a/output/rss.xml
+++ b/output/rss.xml
@@ -5,8 +5,8 @@
<description>Apache Zeppelin - The Apache Software
Foundation</description>
<link>http://zeppelin.apache.org</link>
<link>http://zeppelin.apache.org</link>
- <lastBuildDate>2024-02-17T13:54:32+00:00</lastBuildDate>
- <pubDate>2024-02-17T13:54:32+00:00</pubDate>
+ <lastBuildDate>2024-02-24T15:16:23+00:00</lastBuildDate>
+ <pubDate>2024-02-24T15:16:23+00:00</pubDate>
<ttl>1800</ttl>
diff --git a/output/security.html b/output/security.html
index e4869e211..cfc1038c6 100644
--- a/output/security.html
+++ b/output/security.html
@@ -211,6 +211,14 @@ trusted users access to Zeppelin. Specifically, unless
Docker or K8s
isolation has been configured as mentioned above, users technically
have access to all notes by other users.</p>
+<h2>Executable verification</h2>
+
+<p>When running Zeppelin service, be mindful that it utilizes executables
+which might be pre-installed on your server or container. These
+executables could potentially be altered for malicious purposes.
+To mitigate this risk, it's recommended to set the paths to trusted
+locations for these executables, such as PYTHON and SPARK_HOME.</p>
+
<h1>Reporting security issues</h1>
<p>If you have found a potential security issue in Zeppelin,