-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Labels
help wantedExtra attention is neededExtra attention is neededsecuritysystem security vulnerabilitiessystem security vulnerabilities
Description
- Description:
executeInVM()in bothshared/shieldx-common/pkg/sandbox/firecracker_runner.goandpkg/sandbox/firecracker_runner.gowrites the payload to a temp shell script and runs/bin/shon the host, never launching the MicroVM. Any caller can achieve arbitrary command execution on the host under sandbox credentials. - Location:
FirecrackerRunner.executeInVMhelper in the files noted above. - Recommendation: Ensure payloads execute inside the Firecracker guest (e.g. copy script into VM via API or use serial console). Refuse to run when VM startup fails, drop any direct host shell execution, and add integration tests that verify commands do not run if the VM layer is unavailable.
- Done when: Payloads run exclusively inside the VM, host execution paths are removed, and regression tests cover VM isolation failures.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
help wantedExtra attention is neededExtra attention is neededsecuritysystem security vulnerabilitiessystem security vulnerabilities