more sandboxing scenarios

This commit is contained in:
Kartik K. Agaram 2021-12-25 14:00:03 -08:00
parent 6eecba1b5f
commit 399fb500f4
1 changed files with 9 additions and 0 deletions

View File

@ -8,6 +8,15 @@ doesn't invoke any OS syscalls.
## Top down
Things to secure:
* screen? Keep apps from drawing over standard Teliva UI elements.
* Teliva currently doesn't stop apps from overwriting the menu, if they're
clever. However, it always redraws its UI elements before accepting any
input from the keyboard.
* code? There are currently no protections against .tlv files clobbering
existing definitions. I'm hoping that disallowing native code keeps this
safe. Apps can only affect themselves.
* files opened (for read/write) on file system
* `io_open`
* `io_lines`