How does Dify ensure plugin security? #31711
Replies: 1 comment
-
|
Dify enforces plugin security through several mechanisms: plugin code execution is delegated to an external sandboxed daemon, not run directly in the core app, which helps isolate plugins from the main system. When installing plugins, Dify can enforce signature verification (if configured to restrict to marketplace-only plugins), and it checks the plugin’s verification status and authorized category (like “official” or “partner”) before allowing installation. All credentials associated with a plugin are automatically deleted when the plugin is uninstalled to prevent leakage. However, the actual plugin code in .difypkg files remains encrypted and is not unpacked or reviewed for source-level security by users or the Dify team before listing—verification is based on package metadata and optional signature checks, not source code review. If you require full source-level trust, developing your own custom plugins is currently the only way to guarantee that level of security. To reply, just mention @dosu. How did I do? Good | Irrelevant | Incorrect | Verbose | Hallucination | Report 🐛 | Other |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Self Checks
Content
I notice all content in the
dify-pluginrepository is made up of binary encrypted files(.difypkg), which means I have no way to verify the security of the plugins at all.How does Dify ensure plugin security? Or I can only develop customized plugin all by myself for safety reasons?
Alternatively, could the official team unpack the .difypkg files into source code files and only approve them for listing after a thorough review confirms there are no issues?
Beta Was this translation helpful? Give feedback.
All reactions