Skip to content

chore(SECURITY.md): add more description regarding the UDF security model#4299

Merged
bobbai00 merged 16 commits intoapache:mainfrom
bobbai00:claude/update-security-policy-nNITK
Apr 2, 2026
Merged

chore(SECURITY.md): add more description regarding the UDF security model#4299
bobbai00 merged 16 commits intoapache:mainfrom
bobbai00:claude/update-security-policy-nNITK

Conversation

@bobbai00
Copy link
Copy Markdown
Contributor

@bobbai00 bobbai00 commented Mar 17, 2026

What changes were proposed in this PR?

Updated SECURITY.md to provide more detailed guidance on UDF (User-Defined Function) security implications:

Any related issues, documentation, discussions?

Discussion: https://lists.apache.org/thread/thtr1817swnxb94z5fqwmkoob5yck4kl

How was this PR tested?

Documentation-only change. No code or tests affected.

Was this PR authored or co-authored using generative AI tooling?

Generated-by: Claude Code (claude-opus-4-6)

…date

- Add UDF security warning in UI Users section about unsandboxed code execution
- Expand Computing Unit Types with detailed UDF access implications
- Add Java to supported UDF languages throughout
- Add "Isolation of application secrets" to NOT Guaranteed list
- Expand User Code Execution section with known limitation details
- Update Last Updated date to March 2026

https://claude.ai/code/session_01UnG9kQ8oHvtDXPMmouf7z5
@bobbai00 bobbai00 self-assigned this Mar 17, 2026
@bobbai00 bobbai00 added the docs Changes related to documentations label Mar 17, 2026
Comment thread SECURITY.md
Comment thread SECURITY.md
Comment thread SECURITY.md
Comment thread SECURITY.md
claude and others added 3 commits March 17, 2026 02:11
- Restore Unicode right single quotation mark in Resources section
- Revert Access Level wording to original phrasing
- Restore trailing space in Deployments section line
- Revert Last Updated date back to November 2025

All substantive UDF security content additions are preserved.

https://claude.ai/code/session_01UnG9kQ8oHvtDXPMmouf7z5
Reverts the remaining change flagged in PR review comment on line 272.

https://claude.ai/code/session_01UnG9kQ8oHvtDXPMmouf7z5
@chenlica chenlica requested a review from Yicong-Huang March 17, 2026 06:19
Copy link
Copy Markdown
Contributor

@chenlica chenlica left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

@Yicong-Huang
Copy link
Copy Markdown
Contributor

Sorry, but why is the change? it is not documented... and I don't know why we are changing it. If there are private context, please provide link in pr description so that ppl with access can read.

@bobbai00
Copy link
Copy Markdown
Contributor Author

Sorry, but why is the change? it is not documented... and I don't know why we are changing it. If there are private context, please provide link in pr description so that ppl with access can read.

The email thread is attached. Please review the changes introduced in this PR. Thanks.

Comment thread SECURITY.md Outdated
Comment thread SECURITY.md Outdated
Comment thread SECURITY.md Outdated
Copy link
Copy Markdown
Contributor

@Yicong-Huang Yicong-Huang left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Left comments in place. Otherwise, LGTM

claude and others added 2 commits March 17, 2026 21:58
- Update Last Updated date to March 2026
- Generalize JVM-specific references to runtime-agnostic language
- Remove specific mentions of JWT secrets and database credentials

https://claude.ai/code/session_01UnG9kQ8oHvtDXPMmouf7z5
@carloea2
Copy link
Copy Markdown
Contributor

carloea2 commented Mar 18, 2026

I think the line UI Users Access Level: Application-level access only. UI users work within the Texera platform but do not have access to: is misleading. In reality nowadays Texera cannot guarantee UI Regular User cannot do the same as a Deployment Manager. I think we should combine the roles or either be more explicit that Regular UI user is not guarantee to don't be able to behave either as an Admin or even Deployment Manager.

Can we change it to UI Users Access Level: Deployment-level access? or something more explicit?

Comment thread SECURITY.md Outdated
@Yicong-Huang Yicong-Huang enabled auto-merge (squash) March 18, 2026 07:22
@Yicong-Huang Yicong-Huang disabled auto-merge March 18, 2026 07:23
chenlica and others added 2 commits March 18, 2026 09:09
Restructure all UDF-related sections to follow a consistent 3-point tone:
1. State that the security model defines distinct roles with different privileges
2. Acknowledge UDFs as a known limitation that can break role boundaries
3. State deployment managers' responsibility to mitigate via sandboxing,
   disallowing in-process (coordinator JVM) UDFs, and role restrictions

https://claude.ai/code/session_01UnG9kQ8oHvtDXPMmouf7z5
@Yicong-Huang
Copy link
Copy Markdown
Contributor

There are too many duplications of the same statement. It's better not to use AI on this kind of document: let's make it less verbose and more concise.

Comment thread SECURITY.md Outdated
Comment thread SECURITY.md Outdated
@bobbai00
Copy link
Copy Markdown
Contributor Author

There are too many duplications of the same statement. It's better not to use AI on this kind of document: let's make it less verbose and more concise.

Got it. I updated the docs. Please check.

@bobbai00
Copy link
Copy Markdown
Contributor Author

bobbai00 commented Apr 1, 2026

@chenlica @Yicong-Huang can you guys have a pass on the docs? I would like to merge this one ASAP

Comment thread SECURITY.md Outdated
Comment thread SECURITY.md
Comment thread SECURITY.md Outdated
Comment thread SECURITY.md Outdated
Comment thread SECURITY.md Outdated
@bobbai00 bobbai00 enabled auto-merge (squash) April 2, 2026 01:18
@bobbai00 bobbai00 merged commit 50636fd into apache:main Apr 2, 2026
12 checks passed
ELin2025 pushed a commit to ELin2025/texera that referenced this pull request Apr 13, 2026
…odel (apache#4299)

### What changes were proposed in this PR?

Updated `SECURITY.md` to provide more detailed guidance on UDF
(User-Defined Function) security implications:

### Any related issues, documentation, discussions?

Discussion:
https://lists.apache.org/thread/thtr1817swnxb94z5fqwmkoob5yck4kl

### How was this PR tested?

Documentation-only change. No code or tests affected.

### Was this PR authored or co-authored using generative AI tooling?

Generated-by: Claude Code (claude-opus-4-6)

---------

Co-authored-by: Claude <noreply@anthropic.com>
Co-authored-by: Yicong Huang <17627829+Yicong-Huang@users.noreply.github.com>
Co-authored-by: Chen Li <chenli@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

docs Changes related to documentations

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants