Security

Reporting New Security Problems with Apache StormCrawler

The Apache Software Foundation takes a very active stance in eliminating security problems and denial of service attacks against its products.

We strongly encourage people to report security problems privately using the security mailing list of the ASF Security Team before disclosing them in a public forum.

Please note that the security mailing list should only be used for reporting undisclosed security vulnerabilities and managing the process of fixing such vulnerabilities. We cannot accept regular bug reports or other queries at this address. All mail sent to this address that does not relate to an undisclosed security problem in our source code will be ignored.

The private security mailing address is: security@stormcrawler.apache.org

Threat Model and Security Considerations

StormCrawler is designed to operate in trusted environments as part of a distributed Apache Storm® cluster. This document outlines the threat model and key security assumptions to help users understand the secure use and deployment of StormCrawler.

Trusted Configuration

The configuration file used by StormCrawler is loaded during topology submission and is treated as a trusted source. It does not involve any user-supplied input at runtime.

If an attacker is able to modify this file, they would already have full access to the system, including:

Securing the configuration file and the environment in which topologies are submitted is essential. However, modification of the file implies full system compromise and is out of scope for runtime protections.

Apache Storm® Cluster Security

StormCrawler runs on an Apache Storm® cluster, which is designed to allow users to:

This model inherently trusts cluster users and assumes they are authorized.

Security Recommendations:

Summary

StormCrawler's security model assumes a trusted deployment environment. Users should:

Asking Questions About Known Security Problems

Questions about:

should be addressed to the dev mailing list.

Known Security Vulnerabilities

No known security vulnerability yet.