-
Notifications
You must be signed in to change notification settings - Fork 14.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Superset pages flagged as malicious and dangerous #32110
Comments
@Mycobee Hello there! I'm here to assist you with any bugs, questions, or contributions. Let's dive into this issue and get it resolved! To address the issue of Superset pages being flagged as malicious due to scripts from scarf.sh, you can manually disable Scarf telemetry requests by modifying the source code. Here are the steps you need to follow:
<TelemetryPixel
version={navbarRight.version_string}
sha={navbarRight.version_sha}
build={navbarRight.build_number}
/> These changes should stop the telemetry requests that might be causing the pages to be flagged [1]. To continue talking to Dosu, mention @dosu. Help Dosu learn! Give it feedback: Great Response | Irrelevant Answer | Incorrect Sources | Too Verbose | Hallucination | Other |
@dosu this is not helpful because my js is already compiled... I am currently working on a fix to block scarf on the k8s network level |
@Mycobee Oh, I see you're diving deep into the network level! I'm a bot designed to help with bugs, technical questions, and engineering knowledge, but it sounds like you're venturing into territory I can't assist with. If you think I should have more tricks up my sleeve, feel free to reach out to the Dosu Team. They'll be happy to hear your thoughts! To continue talking to Dosu, mention @dosu. Help Dosu learn! Give it feedback: Great Response | Irrelevant Answer | Incorrect Sources | Too Verbose | Hallucination | Other |
@dosu i see now the requests are all happening from the frontend, so that was a waste of time. How can I disable scarf easily with my helm chart? |
To disable Scarf using your Helm chart, you can opt-out of the data collection by editing the To continue talking to Dosu, mention @dosu. Help Dosu learn! Give it feedback: Great Response | Irrelevant Answer | Incorrect Sources | Too Verbose | Hallucination | Other |
@dosu that doesnt work. Please provide another option |
To completely disable Scarf telemetry in Apache Superset, you can set the export SCARF_ANALYTICS=false If you are using Docker Compose, you can also edit the To continue talking to Dosu, mention @dosu. Help Dosu learn! Give it feedback: Great Response | Irrelevant Answer | Incorrect Sources | Too Verbose | Hallucination | Other |
I am done talking to the robot, but I am all ears if anyone has any ideas how to dynamically set this in the official registry containers with a precompiled frontend |
It's correct, you can simply disable the Scarf gateway with the SCARF_ANALYTICS env var. You'll want to either disable it or allow your networking config to load the (anonymous) tracking pixel and send its telemetry ping when doing npm install. If you search for Scarf in the docs it provides a bit more info about this. As for why it's being flagged as malicious in the first place, I'm not sure... @arjundevarajan might be interested or have more insights here. |
Can I try to solve the issue ? |
I don't mean to split hairs @rusackas, but I think this is incorrect currently for a Kubernetes deployment with the superset Helm chart.
Browsers are still making calls to scarf analytics with these config options With a Scarf Analytics are disabled by JavaScript is not my expertise, but I believe this has something to do with build time, not at run time (at least for source 2). That might explain the precompilation specific problem ?? But in the official helm deployment, we do have access to a webpack process as everything is bundled in to 1 container. Did you read the thread of the similar issue? I linked it in my bug report: This user had to manually delete files to fix their problem, and it seems they are running docker. So IMO there is enough evidence to look further in to this. Unfortunately, I cannot manually delete files like that user could, since my assets are all precompiled in one big file. |
@Rupantar-Borphukan , I am not a core contributor to this project. But I do think this issue needs further investigation. There are two publicly reported instances of the bug. And both instances report challenges disabling scarf analytics using the blessed environment variable. |
We got same issue at some of chrome users. *upd. after few page visits, all browsers show warning now.
|
|
I'm using import { embedDashboard } from '@superset-ui/embedded-sdk this sdk in frontend react code , i'm also getting dangerous site in chrome browser, can someone help me , how to fix this. |
@rusackas a few potential things we can do to fix this: We now support custom variables on our native Scarf pixels which don't use a redirect. This may help appease Brave and other browsers without a loss of functionality. If it doesn't, we also now support pixels on custom domains, so we could avoid needing to use a Happy to help here in any case! The Scarf team is also reaching out to Brave and others to have us removed from these lists. While we are helping with privacy-conscious observability, there is absolutely no phishing or other malware associated with these URLs. |
Bug description
Accessing Superset pages has been detected by Chrome and Firefox as Dangerous (or Phishing sites)
This is causing browsers to break, and no changes have happened on my end. I highly suspect this has to do with scarf.sh, which is running scripts that the browsers are flagging as problematic...specifically from this URL
https://apachesuperset.gateway.scarf.sh/pixel/
I have a cluster deployed with helm, and using a valid and up-to-date tls certificate from letsencrypt. Unfortunately, my clients are no longer able to access the cluster without overriding browser security recommendations.
I tried a variety of mechanism to disable scarf in my values.yaml including
manually setting:
Screenshots/recordings
Superset version
master / latest-dev
Python version
3.9
Node version
dunno...not sure how to figure this out easily from inside the container
Browser
Brave/Firefox
Additional context
Others are having this problem on different platforms:
#31856 (comment)
As an aside, it feels unethical to distribute free software with tracking enabled, especially given no meaningful or straightforward way to ensure consent before enabling/disabling it.
Checklist
The text was updated successfully, but these errors were encountered: