upvote
> But if it can't talk to the internet, I kind of don't see the issue.

No internet access doesn't save you.

With file system access it can delete a file.

Without sudo access it can silently add something to your user's crontab so a few days from now it runs a custom shell script that does anything with internet access. If you're not checking into this sort of thing regularly, you wouldn't know.

It can add something to your user's shell's rc so when you open a new terminal session, a bad side effect happens.

Malware scanning won't protect from these sort of things and every time a new version is available, it's another opportunity for something bad to happen.

To be fair this isn't a problem unique to Obsidian. Code editor plugins and most programming language package managers have the same problem.

reply
Oh right. I keep forgetting second order effects are a thing.
reply
Confirmed: https://obsidian.md/help/plugin-security#Plugin+capabilities

There is no sandboxing at all. Every plugin has full access to your computer.

reply
Is there auto-updating of plug-ins?

Installing a plug-in and reviewing its code at that point is one thing. But if the plug-in can be updated withut you knowing, then there’s little guarantee of security.

reply
You can automatically check for updates but it's off by default, and still requires a manual click. Also the new plugin review system automatically scans every release.
reply
Well damn, start the countdown till the inevitable exploit of this.

I’m thinking maybe 1 or 2 weeks from now…

reply
Theoretically in an Electron app, you could run plugins in a separate v8 context without the node native FS libraries available. Short of OS-level sandboxing that's probably the best they could do.
reply
Like what cloudflare does in EmDash (the spiritual successor to WordPress).

But almost all plugins would need to be rewritten?

reply