This is an automated email from the ASF dual-hosted git repository. wanghailin pushed a commit to branch add-security-notice in repository https://gitbox.apache.org/repos/asf/seatunnel-website.git
commit 6588ba463f7047bed3a5e0ccd49e8d0cfeead1fa Author: hailin0 <[email protected]> AuthorDate: Tue May 20 17:45:53 2025 +0800 [NOTICE] Add submodule security notice --- src/pages/security/languages.json | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/src/pages/security/languages.json b/src/pages/security/languages.json index 20e49d487db6..29ad78dac51e 100644 --- a/src/pages/security/languages.json +++ b/src/pages/security/languages.json @@ -7,7 +7,9 @@ "security_p_two": " by dropping a mail at ", "security_p_three": " In the mail, specify the project name SeaTunnel with the description of the issue or potential threat. You are also urged to recommend the way to reproduce and replicate the issue. The security team and the SeaTunnel community will get back to you after assessing and analysing the findings.", "security_p_notice": "Before using SeaTunnel, please review the usage documentation to ensure you understand the purpose and impact of each operation.", + "security_p_seatunnel_web_notice": "In seatunnel-web, it's up to the system administrator to handle user authentication. Once a user is logged in, they get full access to the system. seatunnel-web won’t perform any extra security checks when calling third-party SDKs.", + "security_p_seatunnel_zeta_notice": "The same goes for seatunnel-zeta: any client that has been authenticated will have full access. System don’t do additional security checks when those client connections interact with third-party SDKs.", "tip": "PLEASE PAY ATTENTION to report the security issue on the security email before disclosing it on public domain." } } -} \ No newline at end of file +}
