-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bind DiskFileSystemProvider for file scheme in electron-renderer process #8177
Comments
cc @marcdumais-work @marechal-p |
https://webpack.js.org/configuration/target/ Seems like the
|
Regarding the security concern of leaving
If we do not disable On the other hand... We provide components (fs, processes, etc) that do almost everything that node does. Hiding node but leaving our own APIs that are just as powerful doesn't help in that regard... |
What are the attack vector(s), for exploiting the node integration and Theia's APIs? i.e. where would that bad code potentially come from? I can see a few sources:
Other ideas? |
@marechal-p ping |
I don't have other ideas. The first 3 points are part of the build system, before publishing. The last point (XSS injection) can happen if some exploit is present in our own code, or some library (but mostly in our own code). |
I'm particularly interested in VS Code view on this topic as well. It should be the resolved issue for them. |
Motivation:#8152 (comment)
There are following prerequisites:
DiskFileSystemProvider
makes use ofpath
,fs
andnsfw
modules. It could be done as a separate PR which bundles the backend and the same approach should be applied to frontend code for electron case.
DiskFileSystemProvider
like that then. We should figure out why VS Code allows it and when enabling node isolation actually make sense.The text was updated successfully, but these errors were encountered: