A clarification to this - the dag parser today is likely not protection against 
a dedicated malicious DAG author, but it does protect against casual DB access 
attempts - the db session is blanked out in the parsing process , as are the 
env var configs 
https://github.com/apache/airflow/blob/main/task-sdk/src/airflow/sdk/execution_time/supervisor.py#L274-L316
 - is this perfect no? but it’s much more than no protection

> On 24 Jul 2025, at 21:56, Jarek Potiuk <ja...@potiuk.com> wrote:
> 
> Currently in the DagFile processor there is no  built-in protection against
> user code from Dag Parsing to - for example - read database
> credentials from airflow configuration and use them to talk to DB directly.

Reply via email to