> A clarification to this - the dag parser today is likely not protection
against a dedicated malicious DAG author, but it does protect against
casual DB access attempts - the db session is blanked out in the parsing
process , as are the env var configs
https://github.com/apache/airflow/blob/main/task-sdk/src/airflow/sdk/execution_time/supervisor.py#L274-L316
-
is this perfect no? but it’s much more than no protection
Oh absolutely.. This is exactly what we discussed back then in March I
think - and the way we decided to go for 3.0 with full knowledge it's not
protecting against all threats.

On Fri, Jul 25, 2025 at 8:22 AM Ash Berlin-Taylor <a...@apache.org> wrote:

> A clarification to this - the dag parser today is likely not protection
> against a dedicated malicious DAG author, but it does protect against
> casual DB access attempts - the db session is blanked out in the parsing
> process , as are the env var configs
> https://github.com/apache/airflow/blob/main/task-sdk/src/airflow/sdk/execution_time/supervisor.py#L274-L316
> - is this perfect no? but it’s much more than no protection
>
> > On 24 Jul 2025, at 21:56, Jarek Potiuk <ja...@potiuk.com> wrote:
> >
> > Currently in the DagFile processor there is no  built-in protection
> against
> > user code from Dag Parsing to - for example - read database
> > credentials from airflow configuration and use them to talk to DB
> directly.
>

Reply via email to