Execute Command Node is so powerful that it can rm -rf
all the folders in the machine…
Can we add a environment variable or token to double authorize this execution?
Or other prevention method?
Execute Command Node is so powerful that it can rm -rf
all the folders in the machine…
Can we add a environment variable or token to double authorize this execution?
Or other prevention method?
No sorry, there it is really everything or nothing. Adding logic to find out what could be potentially dangerous and the confirm that somehow sounds like a lot of work without gaining very much. Especially when there is currently so much other more important stuff to do. I can simply advise to be careful and best run n8n within Docker.
What is possible right now is to simply deactivate the node like described here:
Yes, you are right. Using docker may solve this issue for now.