| ▲ | kepano 4 hours ago | |||||||||||||||||||||||||
Obsidian CEO here. We've been working for nearly a year to launch this new Community site and review system. I'm very excited about this first version but there are many more improvements to come. I've tried to be exhaustive with the blog post, FAQs, and next steps on our roadmap, but I am sure I forgot some things, so feel free to ask! This has been an incredibly challenging project for a number of reasons. We're only seven people but we have thousands of plugin developers and millions of users. There are many competing priorities to balance. We wanted to make sure the new system would be easy to adopt, backwards compatible, and not completely break people's workflows, while still being a major improvement over the old approach, and allow us to gradually continue enhancing security and discoverability of plugins. Consider it a work in progress. We're listening to everyone's ideas and gripes, and will keep iterating :) | ||||||||||||||||||||||||||
| ▲ | zie 11 minutes ago | parent | next [-] | |||||||||||||||||||||||||
I love that under disclosures "Plugin might make requests to 1 external domain", if you click on it, it shows the domain: "github.com". great work! Example from https://community.obsidian.md/plugins/zotlit | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | simonw 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
I have a bunch of projects with plugins and I've sometimes thought about introducing a "reviewed" mechanism where the project marks specific versions as reviewed and trusted. One of the things that's held me back (aside from the huge time commitment) is my fear that people will come to depend on that review process, such that if the process misses an obfuscated exploit the project itself will be blamed for the subsequent attacks. How are you thinking about that? To me it feels like the difference between the Debian/Ubuntu approach - everything in their registry is tightly reviewed - and the PyPI/npm approach where there's no review guarantees at all. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | AntiUSAbah 12 minutes ago | parent | prev | next [-] | |||||||||||||||||||||||||
Finally! When i tried obsidian and discoverd that the data table thing was not build in but some plugin which has full access, i deleted Obsidian quickly after. But you are only 7 people? Crazy :D | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | btown 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
Congrats on the launch! Curious about whether the automated scanning system flags expansions of scope and network domain access for internal/human review. For instance, an AI summarization plugin that starts by saying it accesses url="api.openai.com"+path with a user-supplied OpenAI key is going to be incredibly common - and I'm really excited for what the community builds here! But what if that plugin has an update that allows the "user" to choose an arbitrary endpoint as an OpenAI-compatible API - how do you ensure that's not a malicious update that has coopted that flexibility to create a network egress that will bypass your scans, and might subtly prefill that with a malicious endpoint? | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | jjice 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
Fantastic work from the Obsidian team! I'll gladly continue to be a Obsidian Sync user and can't wait to feel more comfortable using community plugins. Seriously excellent work from y'all. | ||||||||||||||||||||||||||
| ▲ | sneilan1 24 minutes ago | parent | prev [-] | |||||||||||||||||||||||||
Awesome!! Super excited to try this out. Amazing work. | ||||||||||||||||||||||||||