From b8a9a4a862e4d61630c5bc8089261c7a177ec97a Mon Sep 17 00:00:00 2001 From: David Sherret Date: Fri, 4 Oct 2024 08:16:35 +0100 Subject: Revert "feat: warn when using --allow-run with no allow list" (#26021) Although using `--allow-run` without an allow list gives basically no security, I think we should remove this warning because it gets in the way and the only way to disable it is via --quiet. --- tests/specs/permission/deny_run_binary_absolute_path/main.out | 1 - 1 file changed, 1 deletion(-) (limited to 'tests/specs/permission/deny_run_binary_absolute_path') diff --git a/tests/specs/permission/deny_run_binary_absolute_path/main.out b/tests/specs/permission/deny_run_binary_absolute_path/main.out index fef29eae7..45b228387 100644 --- a/tests/specs/permission/deny_run_binary_absolute_path/main.out +++ b/tests/specs/permission/deny_run_binary_absolute_path/main.out @@ -1,4 +1,3 @@ -Warning --allow-run without an allow list is susceptible to exploits. Prefer specifying an allow list (https://docs.deno.com/runtime/fundamentals/security/#running-subprocesses) NotCapable: Requires run access to "deno", run again with the --allow-run flag at [WILDCARD] { name: "NotCapable" -- cgit v1.2.3