diff options
author | Ryan Dahl <ry@tinyclouds.org> | 2018-07-03 21:18:42 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2018-07-03 21:18:42 +0200 |
commit | 6c9598d35830625ebbefe0716b4ec0853ff279d6 (patch) | |
tree | 32968735cc24f329ebce437f89823b640d53c16e | |
parent | 6f7ca760b8393a74992c9b7b6ddc0b65b8d8807c (diff) |
Adjust roadmap security text. (#320)
-rw-r--r-- | Roadmap.md | 28 |
1 files changed, 15 insertions, 13 deletions
diff --git a/Roadmap.md b/Roadmap.md index bfcd1d08e..560ed3ffb 100644 --- a/Roadmap.md +++ b/Roadmap.md @@ -44,17 +44,16 @@ https://github.com/ry/deno/master/testing.js * Threat model: * Modifiying/deleting local files * Leaking private information -* By default: - * No network access - * No local write access - * No non-js extensions - * No subprocesses - * No env access +* Disallowed default: + * Network access + * Local write access + * Non-JS extensions + * Subprocesses + * Env access +* Allowed default: * Local read access. * argv, stdout, stderr, stdin access always allowed. - * Optional: temp dir by default. But what if they create symlinks there? -* (We could relax by saying, you can get network access first and read access - after that.) + * Maybe: temp dir write access. (But what if they create symlinks there?) * The user gets prompted when the software tries to do something it doesn't have the privilege for. * Have an option to get a stack trace when access is requested. @@ -62,10 +61,13 @@ https://github.com/ry/deno/master/testing.js to monkey patching techniques. Access should be granted per program (js context). -Program requests write access to "~/.ssh/id_rsa". Grant? [yNs]? -http://gist.github.com/asdfasd.js requests network access to "www.facebook.com". Grant? [yNs]? -Program requests access to environment variables. Grant? [yNs]? -Program requests to spawn `rm -rf /`. Cool? +Example security prompts. Options are: YES, NO, PRINT STACK +``` +Program requests write access to "~/.ssh/id_rsa". Grant? [yNs] +http://gist.github.com/asdfasd.js requests network access to "www.facebook.com". Grant? [yNs] +Program requests access to environment variables. Grant? [yNs] +Program requests to spawn `rm -rf /`. Grant? [yNs] +``` * cli flags to grant access ahead of time --allow-all --allow-write --allow-net --allow-env --allow-exec |