Security Concerns with Zero Touch Nodes

I have been working on a node that will allow me to track graph usage via a cloud based SQL database, and it got me thinking; aren’t Zero Touch nodes a huge security risk because they can expose a whole lot more sysyem information and access without any ability to look behind the hood? Who knows what those nodes could be transmitting. Am I wrong?

This was raised in this thread too.

i suggest you read it, take it in, and move on


Thought we were overdue for this debate again… always a fun one.

I would stress this over anything else I stated in there:

1 Like