0
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2025-02-01 20:25:12 -05:00

Adjust roadmap security text. (#320)

This commit is contained in:
Ryan Dahl 2018-07-03 21:18:42 +02:00 committed by GitHub
parent 6f7ca760b8
commit 6c9598d358
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -44,17 +44,16 @@ https://github.com/ry/deno/master/testing.js
* Threat model:
* Modifiying/deleting local files
* Leaking private information
* By default:
* No network access
* No local write access
* No non-js extensions
* No subprocesses
* No env access
* Disallowed default:
* Network access
* Local write access
* Non-JS extensions
* Subprocesses
* Env access
* Allowed default:
* Local read access.
* argv, stdout, stderr, stdin access always allowed.
* Optional: temp dir by default. But what if they create symlinks there?
* (We could relax by saying, you can get network access first and read access
after that.)
* Maybe: temp dir write access. (But what if they create symlinks there?)
* The user gets prompted when the software tries to do something it doesn't have
the privilege for.
* Have an option to get a stack trace when access is requested.
@ -62,10 +61,13 @@ https://github.com/ry/deno/master/testing.js
to monkey patching techniques. Access should be granted per program (js
context).
Program requests write access to "~/.ssh/id_rsa". Grant? [yNs]?
http://gist.github.com/asdfasd.js requests network access to "www.facebook.com". Grant? [yNs]?
Program requests access to environment variables. Grant? [yNs]?
Program requests to spawn `rm -rf /`. Cool?
Example security prompts. Options are: YES, NO, PRINT STACK
```
Program requests write access to "~/.ssh/id_rsa". Grant? [yNs]
http://gist.github.com/asdfasd.js requests network access to "www.facebook.com". Grant? [yNs]
Program requests access to environment variables. Grant? [yNs]
Program requests to spawn `rm -rf /`. Grant? [yNs]
```
* cli flags to grant access ahead of time --allow-all --allow-write --allow-net
--allow-env --allow-exec