-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add SecurityManager support to block suspicious code #622
Labels
ctg-enhancement
New feature, improvement or change request
Comments
Markoutte
added a commit
that referenced
this issue
Aug 1, 2022
7 tasks
Markoutte
added a commit
that referenced
this issue
Aug 2, 2022
Markoutte
added a commit
that referenced
this issue
Aug 4, 2022
Markoutte
added a commit
that referenced
this issue
Aug 4, 2022
Markoutte
added a commit
that referenced
this issue
Aug 9, 2022
Markoutte
added a commit
that referenced
this issue
Aug 22, 2022
Markoutte
added a commit
that referenced
this issue
Aug 23, 2022
Repository owner
moved this from Todo
to Done
in UTBot Java
Aug 23, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
Fuzzer doesn't analyze the code it runs for instrumentation. It is needed to sandbox this code to block suspicious code from running.
Expected behavior
Fuzzer shouldn't be able to run code without the appropriate permissions.
Environment
This restrictions should work for every supported environment.
Potential alternatives
The running can be instrumented or to be contained as well.
The text was updated successfully, but these errors were encountered: