If you discover a security vulnerability in this project, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please email security@databricks.com with:
- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge receipt within 48 hours and provide a timeline for a fix.
- The app uses Databricks Apps OBO (On-Behalf-Of) authentication
- All API endpoints require authentication (except
/api/healthand/api/config) - Without OBO enabled, the app falls back to a read-only service principal with no admin privileges
- The app accesses data through the authenticated user's permissions
- System table queries (
system.mlflow.*,system.billing.*,system.serving.*) respect Unity Catalog ACLs - Cross-workspace data requires account-level access
- Never commit secrets (
.env, tokens, keys) to the repository - Use Databricks Secrets for service principal credentials
- The
deploy.shscript generatesapp.yamlfrom.envat deploy time —app.yamlis not committed with real values
- CORS is disabled by default in production (same-origin)
- Only enable
CORS_ORIGINSfor local development