From bfcfa93aa252ef9ef0ba59ed2de29ced253aa571 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Henr=C3=A9=20Botha?= <5593874+henrebotha@users.noreply.github.com> Date: Fri, 2 May 2025 11:12:38 +0200 Subject: [PATCH] Warn more harshly about JS security risks --- docs/docs/queries/dql-js-inline.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/docs/docs/queries/dql-js-inline.md b/docs/docs/queries/dql-js-inline.md index 77528fa7..3e252b6a 100644 --- a/docs/docs/queries/dql-js-inline.md +++ b/docs/docs/queries/dql-js-inline.md @@ -92,7 +92,10 @@ what you can do with it, see the [API documentation](../api/code-reference.md), examples](../api/code-examples.md). !!! attention "Advanced usage" - Writing Javascript queries is a advanced technique that requires understanding in programming and JS. Please be aware that JS Queries have access to your file system and be cautious when using other peoples' JS Queries, especially when they are not publicly shared through the Obsidian Community. + Writing Javascript queries is an advanced technique that requires understanding programming and JS. + +!!! warning "Security risk" + Please be aware that JS queries have **access to your file system**. A malicious (or buggy) JS query can result in data loss, including **data theft**! Be cautious when using other people's JS queries, especially when they are not publicly shared through the Obsidian Community. ## Inline Dataview JS