diff --git a/docs/reference/modules/scripting/security.asciidoc b/docs/reference/modules/scripting/security.asciidoc index be1806175c1..eaeb1c62143 100644 --- a/docs/reference/modules/scripting/security.asciidoc +++ b/docs/reference/modules/scripting/security.asciidoc @@ -51,12 +51,11 @@ Bad: [[modules-scripting-security-do-no-weaken]] === Do not weaken script security settings By default Elasticsearch will run inline, stored, and filesystem scripts for -sandboxed languages, namely the scripting language Painless, the template +the builtin languages, namely the scripting language Painless, the template language Mustache, and the expression language Expressions. These *ought* to be safe to expose to trusted users and to your application servers because they -have strong security sandboxes. By default Elasticsearch will only run -filesystem scripts for non-sandboxed languages and enabling them is a poor -choice because: +have strong security sandboxes. The Elasticsearch committers do not support any +non-sandboxed scripting languages and using any would be a poor choice because: 1. This drops a layer of security, leaving only Elasticsearch's builtin <>. 2. Non-sandboxed scripts have unchecked access to Elasticsearch's internals and @@ -130,8 +129,8 @@ in the following form: `${pluginName}_${operation}`. The following example disables scripting for `update` and `plugin` operations, regardless of the script source or language. Scripts can still be executed -from sandboxed languages as part of `aggregations`, `search` and plugins -execution though, as the above defaults still get applied. +as part of `aggregations`, `search` and plugins execution though, as the above +defaults still get applied. [source,yaml] -----------------------------------