-
Notifications
You must be signed in to change notification settings - Fork 1
Labels
P1Important priorityImportant priorityepicMilestone-level tracking issueMilestone-level tracking issuesecuritySecurity hardeningSecurity hardeningtoolsTool execution and MCP integrationTool execution and MCP integration
Description
Summary
Shell sandbox relies on heuristic substring matching, bypassable via shell metacharacters ($IFS, backtick expansion, base64 encoding). Path canonicalization fallback on nonexistent paths is also exploitable.
Child Issues
- Replace substring blocked command detection with AST parsing or OS sandbox #628 Replace substring blocked command detection with AST parsing or OS sandbox
- Use std::path::absolute() as canonicalize fallback #629 Use
std::path::absolute()as canonicalize fallback
Reactions are currently unavailable
Sub-issues
Metadata
Metadata
Assignees
Labels
P1Important priorityImportant priorityepicMilestone-level tracking issueMilestone-level tracking issuesecuritySecurity hardeningSecurity hardeningtoolsTool execution and MCP integrationTool execution and MCP integration