Apache Superset pages have been flagged as Dangerous or Phishing Site by Chrome and Firefox #31856
Replies: 1 comment 4 replies
-
Hey there, @mecan-soonee! I'm here to help you with any bugs, questions, or contribution inquiries you might have. Let's tackle this issue together! To disable the SCARF telemetry requests in Apache Superset, you should set the If you are using Docker Compose, ensure that the Additionally, for Docker Compose installations, you can opt-out of telemetry data collection by editing the If these steps do not resolve the issue, it might be worth checking if there are any other configurations or customizations in your setup that could be affecting the telemetry settings. To continue talking to Dosu, mention @dosu. Help Dosu learn! Give it feedback: Great Response | Irrelevant Answer | Incorrect Sources | Too Verbose | Hallucination | Other |
Beta Was this translation helpful? Give feedback.
-
I have been using Apache Superset (v4.0.0) for more than 6 months and it worked fine until the past 2 weeks where, accessing the Superset pages have been detected by Chrome and Firefox as Dangerous (or Phishing sites). The Apache Superset was hosted on Debian OS, EC2 instance with MySQL.
At first I thought the sites have been security compromised (being hacked or so). Then I tried brought up another new instance with totally new set up on different EC2 instance (on Amazon Linux 2023, new MySQL DB, with a new subdomain name). The new Apache Superset still being flagged as Dangerous (by Google Safe Browsing). When performing the checks from https://transparencyreport.google.com/safe-browsing/search?url=https:%2F%2Fsuperset.abc.com%2Flogin%2F&hl=en, the results intermittently returned as followings:
Current status
warning
This site is unsafe
The site https://superset.abc.com/login/ contains harmful content, including pages that:
Try to trick visitors into sharing personal info or downloading software
OR
Current status
check_circle
No unsafe content found
The red flags basically affected all Apache Superset pages.
I deep dived further with different type of installations (by PyPI or Docker Compose) on different instances but to no avail.
The only thing found suspicious to me now is the Scarf Gateway. Do you think this could be the root cause of it being marked as Dangerous or phishing site? Accessing to all Superset pages will trigger the following two requests:
I tried to disable it as suggested in the installation guides below, but the request is still persist on every Superset page load:
**For Superset version 4.1.1 (Github repo), the point 4 above is not valid as the existing docker-compose.yml and docker-compose-non-dev.yml does not contain x-superset-image setting to apachesuperset.docker.scarf.sh/apache/superset
Can anyone please advise how can I disable the SCARF telemetry request? As I need to confirm if this is the culprit of my Superset pages being incorrectly flagged red (dangerous).
Or does anyone encounter the similar case where Apache Superset is detected as Dangerous or unsafe site?
**my other websites with the same domain name have no issue. Only the hosted Apache Superset sites are affected. SSL Certificate is valid.
Thanks in advance.
Beta Was this translation helpful? Give feedback.
All reactions