Skip to content

Commit

Permalink
doc: add note on weakness of permission model
Browse files Browse the repository at this point in the history
Malicious JavaScript code can bypass the permission model. Hence, it
does not fulfill the requirements of a security mechanism against
malicious code.
  • Loading branch information
tniessen committed Aug 8, 2024
1 parent 90dea9e commit c31c39e
Showing 1 changed file with 5 additions and 0 deletions.
5 changes: 5 additions & 0 deletions doc/api/permissions.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ be accessed by other modules.
The resource can be entirely allowed or denied, or actions related to it can
be controlled. For example, file system reads can be allowed while denying
writes.
This feature does not protect against malicious code.

If you find a potential security vulnerability, please refer to our
[Security Policy][].
Expand Down Expand Up @@ -595,6 +596,10 @@ There are constraints you need to know before using this system:

#### Limitations and Known Issues

* The permission model provides no security guarantees in the presence of
malicious code. Even when the permission model is enabled, malicious code can
bypass it and execute arbitrary code without the restrictions that are usually
imposed by the permission model.
* Symbolic links will be followed even to locations outside of the set of paths
that access has been granted to. Relative symbolic links may allow access to
arbitrary files and directories. When starting applications with the
Expand Down

0 comments on commit c31c39e

Please sign in to comment.