| ▲ | andai 4 hours ago | ||||||||||||||||
>I think the best (only?) way to solve the plugin security problem would be to properly sandbox them with an explicit API and permission system. I want to say "and especially prevent them from touching my private data (i.e. the whole point of Obsidian plugins being to read/write the documents)". But if it can't talk to the internet, I kind of don't see the issue. EDIT: Apparently due to how JS and Electron works, Obsidian plugins are just JS blobs that run in the global scope, and can read/write the whole filesystem (limited by user permissions) and make HTTP requests? Can someone confirm/deny this pls? | |||||||||||||||||
| ▲ | tomjakubowski 3 hours ago | parent | next [-] | ||||||||||||||||
Theoretically in an Electron app, you could run plugins in a separate v8 context without the node native FS libraries available. Short of OS-level sandboxing that's probably the best they could do. | |||||||||||||||||
| ▲ | Groxx 3 hours ago | parent | prev [-] | ||||||||||||||||
Confirmed: https://obsidian.md/help/plugin-security#Plugin+capabilities There is no sandboxing at all. Every plugin has full access to your computer. | |||||||||||||||||
| |||||||||||||||||