This is an automated email from the ASF dual-hosted git repository.
fanjia pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/seatunnel-website.git
The following commit(s) were added to refs/heads/main by this push:
new 6bb01ab0f640 [NOTICE] Update security notice (#378)
6bb01ab0f640 is described below
commit 6bb01ab0f640c6a5ef05a09eaa34b9a8aae2bf13
Author: hailin0 <[email protected]>
AuthorDate: Mon Jun 16 13:45:23 2025 +0800
[NOTICE] Update security notice (#378)
---
src/pages/security/index.js | 2 ++
src/pages/security/languages.json | 4 +++-
2 files changed, 5 insertions(+), 1 deletion(-)
diff --git a/src/pages/security/index.js b/src/pages/security/index.js
index 4558e02e5214..b0bc8314dc54 100644
--- a/src/pages/security/index.js
+++ b/src/pages/security/index.js
@@ -20,6 +20,8 @@ export default function () {
</p>
<p className="team_desc">{dataSource.info.securitylink}</p>
<p
className="team_desc">{dataSource.info.security_p_notice}</p>
+ <p
className="team_desc">{dataSource.info.security_p_seatunnel_web_notice}</p>
+ <p
className="team_desc">{dataSource.info.security_p_seatunnel_zeta_notice}</p>
<p className="team_desc">{dataSource.info.tip}</p>
</div>
</Layout>
diff --git a/src/pages/security/languages.json
b/src/pages/security/languages.json
index 20e49d487db6..29ad78dac51e 100644
--- a/src/pages/security/languages.json
+++ b/src/pages/security/languages.json
@@ -7,7 +7,9 @@
"security_p_two": " by dropping a mail at ",
"security_p_three": " In the mail, specify the project name SeaTunnel
with the description of the issue or potential threat. You are also urged to
recommend the way to reproduce and replicate the issue. The security team and
the SeaTunnel community will get back to you after assessing and analysing the
findings.",
"security_p_notice": "Before using SeaTunnel, please review the usage
documentation to ensure you understand the purpose and impact of each
operation.",
+ "security_p_seatunnel_web_notice": "In seatunnel-web, it's up to the
system administrator to handle user authentication. Once a user is logged in,
they get full access to the system. seatunnel-web won’t perform any extra
security checks when calling third-party SDKs.",
+ "security_p_seatunnel_zeta_notice": "The same goes for seatunnel-zeta:
any client that has been authenticated will have full access. System don’t do
additional security checks when those client connections interact with
third-party SDKs.",
"tip": "PLEASE PAY ATTENTION to report the security issue on the
security email before disclosing it on public domain."
}
}
-}
\ No newline at end of file
+}