-
Notifications
You must be signed in to change notification settings - Fork 1
Open
Description
What
Create some evil payload that tests that our sandbox is tight.
Why
Better test things ourselves than rely on attackers.
How
Create a payload that tries to do at least the following evil things:
- panic/unwind: feat: infrastructure for "evil" test payloads #162
- write loads of data to stdout/stderr: feat: infrastructure for "evil" test payloads #162
- create an unlimited stack via recursion: feat: infrastructure for "evil" test payloads #162
- allocate a lot of in-VM memory: feat: limit memory consumption #185
- pass a lot of data to the host
- create invalid arrow structures (for
ArrayandDataType) and pass that to the host - fill the in-VM root file system with loads of garbage: test: extend evil test suite #171 & feat: limit memory consumption #185
- try to reach localhost and local network IPs via network
- loop forever and burn CPU time: feat: epoch-based interruption #173
- dereference invalid pointer (like nullptr): feat: infrastructure for "evil" test payloads #162
- emit large values
- UDF name
- many input fields
- deeply nested types
Metadata
Metadata
Assignees
Labels
No labels