<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Qlik Branch Extension Security/Verification in Integration, Extension &amp; APIs</title>
    <link>https://community.qlik.com/t5/Integration-Extension-APIs/Qlik-Branch-Extension-Security-Verification/m-p/1060844#M4527</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Branch content is completely open source and so under the same evaluation of the open source community. Read the source code carefully and when in doubt, dont use.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 May 2016 17:12:16 GMT</pubDate>
    <dc:creator />
    <dc:date>2016-05-03T17:12:16Z</dc:date>
    <item>
      <title>Qlik Branch Extension Security/Verification</title>
      <link>https://community.qlik.com/t5/Integration-Extension-APIs/Qlik-Branch-Extension-Security-Verification/m-p/1060843#M4526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does Qlik verify the contributions or projects on Qlik Branch? If not, is there a way for Qlik users to certify that particular extensions are safe or do not have glaring vulnerabilities? Some of our clients are concerned about allowing unverified third-party Javascript packages to run on their servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 May 2016 07:38:08 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Integration-Extension-APIs/Qlik-Branch-Extension-Security-Verification/m-p/1060843#M4526</guid>
      <dc:creator />
      <dc:date>2016-05-03T07:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Branch Extension Security/Verification</title>
      <link>https://community.qlik.com/t5/Integration-Extension-APIs/Qlik-Branch-Extension-Security-Verification/m-p/1060844#M4527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Branch content is completely open source and so under the same evaluation of the open source community. Read the source code carefully and when in doubt, dont use.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 May 2016 17:12:16 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Integration-Extension-APIs/Qlik-Branch-Extension-Security-Verification/m-p/1060844#M4527</guid>
      <dc:creator />
      <dc:date>2016-05-03T17:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Branch Extension Security/Verification</title>
      <link>https://community.qlik.com/t5/Integration-Extension-APIs/Qlik-Branch-Extension-Security-Verification/m-p/1060845#M4528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe also have a look at Alexander's comment here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.qlikview.com/thread/204479" title="https://community.qlikview.com/thread/204479"&gt;Can extensions carry security risk? | Qlik Community&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 May 2016 17:22:17 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Integration-Extension-APIs/Qlik-Branch-Extension-Security-Verification/m-p/1060845#M4528</guid>
      <dc:creator>swuehl</dc:creator>
      <dc:date>2016-05-03T17:22:17Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Branch Extension Security/Verification</title>
      <link>https://community.qlik.com/t5/Integration-Extension-APIs/Qlik-Branch-Extension-Security-Verification/m-p/1060846#M4529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As other poster stated I would recommend _everyone_ to verify the source code on their own.&lt;/P&gt;&lt;P&gt;You wouldn't copy / paste a load script from a page on the internet into your app and the same rule of thumb should go for Extensions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now with that said, since extensions are just normal objects the usual section access and security rules apply so a extension can't access anything apart from what the user is allowed to see. We also do checks for click-jacking and obvious malicious code for the projects posted on Branch.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 May 2016 16:48:45 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Integration-Extension-APIs/Qlik-Branch-Extension-Security-Verification/m-p/1060846#M4529</guid>
      <dc:creator>Alexander_Thor</dc:creator>
      <dc:date>2016-05-04T16:48:45Z</dc:date>
    </item>
  </channel>
</rss>

