question raised during FOSDEM '22

https://fosdem.org/2022/schedule/event/lastmilesandboxing
This commit is contained in:
Kartik K. Agaram 2022-02-07 21:52:04 -08:00
parent 7122a06466
commit 57d4710f98
1 changed files with 2 additions and 0 deletions

View File

@ -28,6 +28,8 @@ program draws over menu -> getch -> Teliva menu is still visible
TODO protect sensitive teliva files (teliva_edit_buffer, etc.)
should we protect .c sources?
TODO protect against DoS attack filling up disk
assumptions:
listing files in a directory is not worth sandboxing
since reading their contents is sandboxed