Hello @Weasn
I’d love to assist you on your requirements.
You can reach me on Email ltrish@cisinlabs.com] or Skype - live:.cid.baff7c7dd9471b54
Regards,
Trish
Hello @Weasn
PM sent, please check, so that we can have detailed discussion and can proceed it further.
Regards,
Norman
A collaborator who only has access to one Airtable workspace cannot get at data in another Airtable workspace.
Yes, a creator in an Airtable base can install malware. They can write scripts in Scripting app or create a Scripting automation that can do any number of bad things.
However, a collaborator does not need to be a creator to steal you data. Any collaborator, even read-only collaborators, can make a copy of your base.
Even after the programmer is no longer a collaborator for the base, there could be lingering public shares that provide access to the base.
In short: don’t give access to you base to anyone that you don’t trust.
You can remove the Airtable advertisement with a Pro subscription.
A collaborator who only has access to one Airtable workspace cannot get at data in another Airtable workspace.
Yes, a creator in an Airtable base can install malware. They can write scripts in Scripting app or create a Scripting automation that can do any number of bad things.
However, a collaborator does not need to be a creator to steal you data. Any collaborator, even read-only collaborators, can make a copy of your base.
Even after the programmer is no longer a collaborator for the base, there could be lingering public shares that provide access to the base.
In short: don’t give access to you base to anyone that you don’t trust.
You can remove the Airtable advertisement with a Pro subscription.
very helpful!
so basically I can’t hire an unknown programmer to help build the collab table and have any expectation of security.
In other words, I could have an upwork guy build a new form in a dedicated workspace and then copy that collaborated form and associated CRM table over to my regular workspace.
eh, but then any bot in the collab CRM table would be copied to the secure table in the main secure workspace, hmm.
How to get around this?
no way to reveal all automations in the collab table?
How to see if there are any malicious scripts installed in the collab table before copying to the secure table?
upwork will not be applicable here then,
main attribute of the programmer has to be a trusted third party
no way to verify, or then you would be the expert?
very helpful!
so basically I can’t hire an unknown programmer to help build the collab table and have any expectation of security.
In other words, I could have an upwork guy build a new form in a dedicated workspace and then copy that collaborated form and associated CRM table over to my regular workspace.
eh, but then any bot in the collab CRM table would be copied to the secure table in the main secure workspace, hmm.
How to get around this?
no way to reveal all automations in the collab table?
How to see if there are any malicious scripts installed in the collab table before copying to the secure table?
upwork will not be applicable here then,
main attribute of the programmer has to be a trusted third party
no way to verify, or then you would be the expert?
Once you give someone access to your base, you cannot expect Airtable to prevent that person from using that access to do bad things. Now, most Airtable consultants are not going to do bad things, and there are many reputable Airtable consultants. But it is up to you to decide who to trust–not only who will not inject malware into your base or steal you data, but also who will do a good job for what you actually want done.
If you have someone from UpWork work in a dedicated workspace, your other workspaces are safe. If you copy something from a base in that dedicated workspace to a different base/workspace, the security risk depends on what you copy. If you copy a table, you aren’t copying any code that can do malicious things. A form by itself contains no code, so copying a form can’t introduce the type of security risks you are worrying about.
Custom code that can access the outside world only exists in
scripting app Look in your dashboards for these. Note that the scripting app installation might have a custom name, but it will still look like scripting app…
scripting automation actions Look in the automations area for these. There is a maximum of 25 automations, and each automation can have up to 25 actions.
custom apps Look in your dashboards for these. These are rare.