[Qgis-psc] [QGIS-Developer] Existing plugin versions should not be marked with "security issues"
johannes.kroeger at wheregroup.com
johannes.kroeger at wheregroup.com
Thu Apr 23 09:40:23 PDT 2026
Hi Lova,
thanks for the super swift response and for removing the badge from
public view. I agree that it is properly the best approach to only show
it to the owners and staff.
If a public badge is planned, I would suggest a long introduction period
during which plugin authors have time to check and update their plugins
before a badge is shown.
Maybe it would be enough only show it for new uploads and leave the old
versions unchecked and unlabeled as before.
All the best, Hannes
Am 2026-04-23 16:03, schrieb Lova Andriarimalala:
> Hi Johannes,
>
> Thanks for raising this issue.
>
> the plugins repository now *publicly* denounces plugins when its
>> security scan has flagged something.
>> I use the word "denounce" aggressively here because as a plugin
>> developer it is not nice to have plugins *which do not actually have
>> security issues* brandished insecure with a BIG RED WARNING, losing
>> trust of their users.
>
>
> Could we just hide the badge from public view and show it only for the
> plugin author/maintainer and, eventually, for staff/superusers? This
> feature was requested by Etienne (
> https://github.com/qgis/QGIS-Plugins-Website/issues/267), but I think
> making it publicly visible wasn't really part of the scope in this case
> (so
> sorry for that). We could always show it in public view later when the
> checks reflect user cases.
>
> The rules are not perfect and at least for plugins where I have insight
>> the false positive rate is higher than the correct flags...
>> For example it flags any requests.get() call without a timeout. The
>> worst that can happen is a hanging QGIS, big whoop...
>> It also flags hashes as secrets and I fail to see how this is helpful
>> for plugins that are *already published and accessible*.
>
>
> That's correct, and we are aware that there are some teething problems
> with
> the ruleset. I would be great if you could please raise an issue at
> https://github.com/qgis/QGIS-Plugins-Website/issues about which case
> you
> think should be addressed by the checks.
> Please also note that we have just published a blog article about the
> plugin checks implementation at
> https://blog.qgis.org/2026/04/23/plugin-repository-security-enhancements/.
>
> Best regards,
>
> Lova Andriarimalala
>
>
> *QGIS Full Stack Developer *
> *T *: +27(0) 87 809 2702 *E *: lova at kartoza.com *W* :
> kartoza.com
>
>
>
> *This email and any attachments are confidential and intended solely
> for
> the use of the individual or entity to whom they are addressed. If you
> *
> *have received this email in error, please notify the sender
> immediately
> and delete it from your system. Unauthorised use, disclosure, or
> copying*
> *of the contents is prohibited.*
>
>
> On Thu, 23 Apr 2026 at 15:59, Johannes Kröger (WhereGroup) via
> QGIS-Developer <qgis-developer at lists.osgeo.org> wrote:
>
>> Hi,
>>
>> the plugins repository now *publicly* denounces plugins when its
>> security scan has flagged something.
>> I use the word "denounce" aggressively here because as a plugin
>> developer it is not nice to have plugins *which do not actually have
>> security issues* brandished insecure with a BIG RED WARNING, losing
>> trust of their users.
>>
>> The rules are not perfect and at least for plugins where I have
>> insight
>> the false positive rate is higher than the correct flags...
>> For example it flags any requests.get() call without a timeout. The
>> worst that can happen is a hanging QGIS, big whoop...
>> It also flags hashes as secrets and I fail to see how this is helpful
>> for plugins that are *already published and accessible*.
>>
>> Please revert the public display of this badge for now. If it is
>> planned
>> to publicly flag existing plugin versions, give developers ample time
>> to
>> review, fix or dispute the findings.
>>
>> Sorry for the aggressive tone but this was unexpected and is very
>> unpleasant to deal with.
>> I do think that the scanning and potential blocking of new versions is
>> a
>> great feature (thank you for it!) but the retrospective scanning with
>> public display without human validation is not.
>>
>> Cheers, Hannes
>>
>>
>> _______________________________________________
>> QGIS-Developer mailing list
>> QGIS-Developer at lists.osgeo.org
>> List info: https://lists.osgeo.org/mailman/listinfo/qgis-developer
>> Unsubscribe: https://lists.osgeo.org/mailman/listinfo/qgis-developer
>>
More information about the QGIS-PSC
mailing list