This is an automated email from the ASF dual-hosted git repository.

wanghailin pushed a commit to branch add-security-notice
in repository https://gitbox.apache.org/repos/asf/seatunnel-website.git

commit 6588ba463f7047bed3a5e0ccd49e8d0cfeead1fa
Author: hailin0 <[email protected]>
AuthorDate: Tue May 20 17:45:53 2025 +0800

    [NOTICE] Add submodule security notice
---
 src/pages/security/languages.json | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/src/pages/security/languages.json 
b/src/pages/security/languages.json
index 20e49d487db6..29ad78dac51e 100644
--- a/src/pages/security/languages.json
+++ b/src/pages/security/languages.json
@@ -7,7 +7,9 @@
       "security_p_two": " by dropping a mail at ",
       "security_p_three": " In the mail, specify the project name SeaTunnel 
with the description of the issue or potential threat. You are also urged to 
recommend the way to reproduce and replicate the issue. The security team and 
the SeaTunnel community will get back to you after assessing and analysing the 
findings.",
       "security_p_notice": "Before using SeaTunnel, please review the usage 
documentation to ensure you understand the purpose and impact of each 
operation.",
+      "security_p_seatunnel_web_notice": "In seatunnel-web, it's up to the 
system administrator to handle user authentication. Once a user is logged in, 
they get full access to the system. seatunnel-web won’t perform any extra 
security checks when calling third-party SDKs.",
+      "security_p_seatunnel_zeta_notice": "The same goes for seatunnel-zeta: 
any client that has been authenticated will have full access. System don’t do 
additional security checks when those client connections interact with 
third-party SDKs.",
       "tip": "PLEASE PAY ATTENTION to report the security issue on the 
security email before disclosing it on public domain."
     }
   }
-}
\ No newline at end of file
+}

Reply via email to