Skip to content

Commit 2c95f6e

Browse files
mcollinaRafaelGSS
authored andcommitted
meta: clarify the threat model to explain the JSON.parse case
Signed-off-by: Matteo Collina <[email protected]> PR-URL: #47276 Reviewed-By: Michaël Zasso <[email protected]> Reviewed-By: Yagiz Nizipli <[email protected]> Reviewed-By: Michael Dawson <[email protected]> Reviewed-By: Colin Ihrig <[email protected]> Reviewed-By: Tobias Nießen <[email protected]> Reviewed-By: Rafael Gonzaga <[email protected]> Reviewed-By: Luigi Pinca <[email protected]>
1 parent b0809a7 commit 2c95f6e

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

SECURITY.md

+4-2
Original file line numberDiff line numberDiff line change
@@ -116,15 +116,17 @@ lead to a loss of confidentiality, integrity, or availability.
116116
npm registry.
117117
The code run inherits all the privileges of the execution user.
118118
4. Inputs provided to it by the code it is asked to run, as it is the
119-
responsibility of the application to perform the required input validations.
119+
responsibility of the application to perform the required input validations,
120+
e.g. the input to `JSON.parse()`.
120121
5. Any connection used for inspector (debugger protocol) regardless of being
121122
opened by command line options or Node.js APIs, and regardless of the remote
122123
end being on the local machine or remote.
123124
6. The file system when requiring a module.
124125
See <https://nodejs.org/api/modules.html#all-together>.
125126

126127
Any unexpected behavior from the data manipulation from Node.js Internal
127-
functions are considered a vulnerability.
128+
functions may be considered a vulnerability if they are expoitable via
129+
untrusted resources.
128130

129131
In addition to addressing vulnerabilities based on the above, the project works
130132
to avoid APIs and internal implementations that make it "easy" for application

0 commit comments

Comments
 (0)