New translations security.mdx (French, Canada)

[ci skip]
This commit is contained in:
crowdin 2024-07-05 17:54:32 +00:00
parent 852cb349f3
commit 483400cc49

View File

@ -0,0 +1,44 @@
---
title: Security concerns
---
Castopod is built on top of [CodeIgniter4](https://codeigniter.com/), a PHP
framework that encourages
[good security practices](https://codeigniter.com/user_guide/concepts/security.html).
To maximize your instance's safety and prevent any malicious attack, we
recommend you update all your Castopod files permissions after installation or
updates (to avoid any prior permission error):
- `writable/` folder must be **readable** and **writable**.
- `public/media/` folder must be **readable** and **writable**.
- any other file must be set to **readonly**.
For instance, if you are using Apache or NGINX with Ubuntu you may do the
following:
```bash
sudo chown -R root:root /path/to/castopod
sudo chown -R www-data:www-data /path/to/castopod/writable
sudo chown -R www-data:www-data /path/to/castopod/public/media
```
## Third-party Plugins
Since v2's [Plugins Architecture](../../plugins), Castopod can be extended with
all sorts of cool features. Anyone can choose to create their own plugins and
even share them with the community.
👉 Plugins are a way to inject code in parts of Castopod through
[Hooks](../../plugins/hooks).
Now, if you create your own plugin and install it in your own Castopod, that
means you control both the code that gets injected and the environment: all is
good!
But as for **third-party plugins**, you must treat them as a **potential
security risk _by default_**:
1. Make sure you **trust the source before installing any third-party plugin**
2. **Review the plugin's code** yourself if you can or
[ask developers from the community for help](https://castopod.org/chat)