Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add SecurityManager support to block suspicious code #622

Closed
Markoutte opened this issue Aug 1, 2022 · 0 comments · Fixed by #625
Closed

Add SecurityManager support to block suspicious code #622

Markoutte opened this issue Aug 1, 2022 · 0 comments · Fixed by #625
Assignees
Labels
ctg-enhancement New feature, improvement or change request

Comments

@Markoutte
Copy link
Collaborator

Description

Fuzzer doesn't analyze the code it runs for instrumentation. It is needed to sandbox this code to block suspicious code from running.

Expected behavior

Fuzzer shouldn't be able to run code without the appropriate permissions.

Environment

This restrictions should work for every supported environment.

Potential alternatives

The running can be instrumented or to be contained as well.

@Markoutte Markoutte self-assigned this Aug 1, 2022
@korifey korifey moved this to Todo in UTBot Java Aug 1, 2022
Repository owner moved this from Todo to Done in UTBot Java Aug 23, 2022
@alisevych alisevych added the ctg-enhancement New feature, improvement or change request label Aug 23, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ctg-enhancement New feature, improvement or change request
Projects
Archived in project
Development

Successfully merging a pull request may close this issue.

2 participants